Action not permitted
Modal body text goes here.
cve-2016-0718
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-31T07:06:39", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0718", "datePublished": "2016-05-26T16:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-0718\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-05-26T16:59:00.133\",\"lastModified\":\"2024-11-21T02:42:14.723\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Expat permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento de entrada mal formado, lo que desencadena un desbordamiento de buffer.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"48.0\",\"matchCriteriaId\":\"9779CA44-29CF-4995-B10E-F9239E989280\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.11.0\",\"versionEndIncluding\":\"10.11.5\",\"matchCriteriaId\":\"8FB26959-7A01-4772-9C34-8836B958CB0A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F892F1B0-514C-42F7-90AE-12ACDFDC1033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BCA435-7594-49E8-9BAE-9E02E129B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5561F-BE86-4EEA-99D4-8697F8BD9DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41A798E-0D69-43C7-9A63-1E5921138EAC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0BA503-3F96-48DA-AF47-FBA37A9D0C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2076747F-A98E-4DD9-9B52-BF1732BCAD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A633996-2FD7-467C-BAA6-529E16BD06D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.0\",\"matchCriteriaId\":\"BE4EECEA-61AE-4AD0-87C2-89DC1890DDDD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.1\",\"matchCriteriaId\":\"CB739B3A-20BB-4118-82DD-7ACFE5881FE2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.15\",\"matchCriteriaId\":\"CF6ABED2-9492-42E0-80A7-AB77C2900E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.3.7\",\"matchCriteriaId\":\"2E822AE7-709A-4DA4-B2C6-7A5968AE62FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.7\",\"matchCriteriaId\":\"E65C03FE-52E0-477A-A104-8F2CC0EEE753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.4\",\"matchCriteriaId\":\"9C0FE3B2-27E6-4DA9-8479-B34E3014AC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.6.2\",\"matchCriteriaId\":\"0AAF5776-8121-49B5-A6AE-815B7CCAC307\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2018_2486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* expat: Out-of-bounds heap read on crafted input causing crash (CVE-2016-0718)\n* curl: escape and unescape integer overflows (CVE-2016-7167)\n* curl: Cookie injection for other servers (CVE-2016-8615)\n* curl: Case insensitive password comparison (CVE-2016-8616)\n* curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)\n* curl: Double-free in curl_maprintf (CVE-2016-8618)\n* curl: Double-free in krb5 code (CVE-2016-8619)\n* curl: curl_getdate out-of-bounds read (CVE-2016-8621)\n* curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)\n* curl: Use-after-free via shared cookies (CVE-2016-8623)\n* curl: Invalid URL parsing with \u0027#\u0027 (CVE-2016-8624)\n* curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)\n* libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) (CVE-2016-9598)\n* pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) (CVE-2017-6004)\n* pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)\n* pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c) (CVE-2017-7244)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7245)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7246)\n* curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)\n* curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)\n* curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP (CVE-2018-0500)\n\nDetails around this issue, including information about the CVE, severity of\nthe issue, and the CVSS score can be found on the CVE page listed in the\nReference section below.\n\nThe following packages have been upgraded to a newer upstream version:\n* Curl (7.57.0)\n* OpenSSL (1.0.2n)\n* Expat (2.2.5)\n* PCRE (8.41)\n* libxml2 (2.9.7)\n\nAcknowledgements:\n\nCVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting this issue.\nUpstream acknowledges Max Dymond as the original reporter.\nCVE-2017-1000257: Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz project) as the original reporter.\nCVE-2018-0500: Red Hat would like to thank the Curl project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2486", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2486.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "tracking": { "current_release_date": "2024-11-22T12:14:14+00:00", "generator": { "date": "2024-11-22T12:14:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2486", "initial_release_date": "2018-08-16T16:06:16+00:00", "revision_history": [ { "date": "2018-08-16T16:06:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T16:06:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:14:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" }, { "cve": "CVE-2016-4975", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375968" } ], "notes": [ { "category": "description", "text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4975" }, { "category": "external", "summary": "RHBZ#1375968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir" }, { "cve": "CVE-2016-5131", "discovery_date": "2016-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358641" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use after free triggered by XPointer paths beginning with range-to", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw in libxml2 requires exposing the library to XPath/XPointer expressions from an untrusted source, which is not common in practice for applications using libxml2. For libxml2, Red Hat Product Security has rated this vulnerability as Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "RHBZ#1358641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5131", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131" }, { "category": "external", "summary": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "url": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" } ], "release_date": "2016-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Use after free triggered by XPointer paths beginning with range-to" }, { "cve": "CVE-2016-7167", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375906" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws leading to heap-based buffer overflows were found in the way curl handled escaping and unescaping of data. An attacker could potentially use these flaws to crash an application using libcurl by sending a specially crafted input to the affected libcurl functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: escape and unescape integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7167" }, { "category": "external", "summary": "RHBZ#1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7167", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160914.html", "url": "https://curl.haxx.se/docs/adv_20160914.html" } ], "release_date": "2016-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: escape and unescape integer overflows" }, { "cve": "CVE-2016-8615", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388370" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Cookie injection for other servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8615" }, { "category": "external", "summary": "RHBZ#1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8615", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102A.html", "url": "https://curl.haxx.se/docs/adv_20161102A.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Cookie injection for other servers" }, { "cve": "CVE-2016-8616", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388371" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Case insensitive password comparison", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8616" }, { "category": "external", "summary": "RHBZ#1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8616", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102B.html", "url": "https://curl.haxx.se/docs/adv_20161102B.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Case insensitive password comparison" }, { "cve": "CVE-2016-8617", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388377" } ], "notes": [ { "category": "description", "text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Out-of-bounds write via unchecked multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8617" }, { "category": "external", "summary": "RHBZ#1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8617", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102C.html", "url": "https://curl.haxx.se/docs/adv_20161102C.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Out-of-bounds write via unchecked multiplication" }, { "cve": "CVE-2016-8618", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388378" } ], "notes": [ { "category": "description", "text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in curl_maprintf", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8618" }, { "category": "external", "summary": "RHBZ#1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8618", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102D.html", "url": "https://curl.haxx.se/docs/adv_20161102D.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in curl_maprintf" }, { "cve": "CVE-2016-8619", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388379" } ], "notes": [ { "category": "description", "text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in krb5 code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8619" }, { "category": "external", "summary": "RHBZ#1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8619", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102E.html", "url": "https://curl.haxx.se/docs/adv_20161102E.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in krb5 code" }, { "cve": "CVE-2016-8621", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388385" } ], "notes": [ { "category": "description", "text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: curl_getdate out-of-bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8621" }, { "category": "external", "summary": "RHBZ#1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8621", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102G.html", "url": "https://curl.haxx.se/docs/adv_20161102G.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: curl_getdate out-of-bounds read" }, { "cve": "CVE-2016-8622", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388386" } ], "notes": [ { "category": "description", "text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: URL unescape heap overflow via integer truncation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8622" }, { "category": "external", "summary": "RHBZ#1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8622", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102H.html", "url": "https://curl.haxx.se/docs/adv_20161102H.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: URL unescape heap overflow via integer truncation" }, { "cve": "CVE-2016-8623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388388" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Use-after-free via shared cookies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8623" }, { "category": "external", "summary": "RHBZ#1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8623", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102I.html", "url": "https://curl.haxx.se/docs/adv_20161102I.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Use-after-free via shared cookies" }, { "cve": "CVE-2016-8624", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388390" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Invalid URL parsing with \u0027#\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8624" }, { "category": "external", "summary": "RHBZ#1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8624", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102J.html", "url": "https://curl.haxx.se/docs/adv_20161102J.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Invalid URL parsing with \u0027#\u0027" }, { "cve": "CVE-2016-8625", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388392" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IDNA 2003 makes curl use wrong host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8625" }, { "category": "external", "summary": "RHBZ#1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8625", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102K.html", "url": "https://curl.haxx.se/docs/adv_20161102K.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IDNA 2003 makes curl use wrong host" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2016-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1395609" } ], "notes": [ { "category": "description", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: XML External Entity vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9318" }, { "category": "external", "summary": "RHBZ#1395609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9318", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9318" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Application parsing untrusted input with libxml2 should be careful to NOT use entity expansion (enabled by XML_PARSE_NOENT) or DTD validation (XML_PARSE_DTDLOAD, XML_PARSE_DTDVALID) on such input.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: XML External Entity vulnerability" }, { "cve": "CVE-2016-9596", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408302" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9596" }, { "category": "external", "summary": "RHBZ#1408302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9596", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)" }, { "cve": "CVE-2016-9597", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408305" } ], "notes": [ { "category": "description", "text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9597" }, { "category": "external", "summary": "RHBZ#1408305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9597", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)" }, { "cve": "CVE-2016-9598", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408306" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9598" }, { "category": "external", "summary": "RHBZ#1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9598", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)" }, { "cve": "CVE-2017-6004", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1425365" } ], "notes": [ { "category": "description", "text": "The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6004" }, { "category": "external", "summary": "RHBZ#1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004" } ], "release_date": "2017-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)" }, { "cve": "CVE-2017-7186", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1434504" } ], "notes": [ { "category": "description", "text": "libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7186" }, { "category": "external", "summary": "RHBZ#1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186" } ], "release_date": "2017-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)" }, { "cve": "CVE-2017-7244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437364" } ], "notes": [ { "category": "description", "text": "The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7244" }, { "category": "external", "summary": "RHBZ#1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7244", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)" }, { "cve": "CVE-2017-7245", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437367" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7245" }, { "category": "external", "summary": "RHBZ#1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7245", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-7246", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437369" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7246" }, { "category": "external", "summary": "RHBZ#1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7246", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7246" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452554" } ], "notes": [ { "category": "description", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9047" }, { "category": "external", "summary": "RHBZ#1452554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9047", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452549" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9048" }, { "category": "external", "summary": "RHBZ#1452549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452549" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9048", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9048" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452556" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9049" }, { "category": "external", "summary": "RHBZ#1452556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452556" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9049", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9049" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452553" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9050" }, { "category": "external", "summary": "RHBZ#1452553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9050", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9050" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictAddString" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566749" } ], "notes": [ { "category": "description", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18258" }, { "category": "external", "summary": "RHBZ#1566749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18258", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18258" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258" } ], "release_date": "2017-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Max Dymond" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000254", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495541" } ], "notes": [ { "category": "description", "text": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: FTP PWD response parser out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000254" }, { "category": "external", "summary": "RHBZ#1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000254", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171004.html", "url": "https://curl.haxx.se/docs/adv_20171004.html" } ], "release_date": "2017-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: FTP PWD response parser out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Brian Carpenter", "the OSS-Fuzz project" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000257", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1503705" } ], "notes": [ { "category": "description", "text": "A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IMAP FETCH response out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000257" }, { "category": "external", "summary": "RHBZ#1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000257", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171023.html", "url": "https://curl.haxx.se/docs/adv_20171023.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Switch off IMAP in `CURLOPT_PROTOCOLS`", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IMAP FETCH response out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Peter Wu" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2018-0500", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597101" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow has been found in the Curl_smtp_escape_eob() function of curl. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of curl/libcurl as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the vulnerable code.\n\nThis issue did not affect the versions of curl/libcurl as shipped with Red Hat Software Collections 3 as they did not include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0500" }, { "category": "external", "summary": "RHBZ#1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_2018-70a2.html", "url": "https://curl.haxx.se/docs/adv_2018-70a2.html" } ], "release_date": "2018-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP" } ] }
rhsa-2016_2824
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for expat is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library for parsing XML documents.\n\nSecurity Fix(es):\n\n* An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)\n\nRed Hat would like to thank Gustavo Grieco for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2824", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2824.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2024-11-22T10:31:59+00:00", "generator": { "date": "2024-11-22T10:31:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2824", "initial_release_date": "2016-11-28T19:35:53+00:00", "revision_history": [ { "date": "2016-11-28T19:35:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-28T19:35:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:31:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product_id": "expat-devel-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-0:2.1.0-10.el7_3.i686", "product_id": "expat-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-static-0:2.1.0-10.el7_3.i686", "product_id": "expat-static-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-0:2.0.1-13.el6_8.i686", "product_id": "expat-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product_id": "expat-devel-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.src", "product": { "name": "expat-0:2.1.0-10.el7_3.src", "product_id": "expat-0:2.1.0-10.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=src" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.src", "product": { "name": "expat-0:2.0.1-13.el6_8.src", "product_id": "expat-0:2.0.1-13.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc", "product_id": "expat-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc", "product_id": "expat-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-0:2.1.0-10.el7_3.s390", "product_id": "expat-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390", "product_id": "expat-static-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-0:2.0.1-13.el6_8.s390", "product_id": "expat-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-0:2.1.0-10.el7_3.s390x", "product_id": "expat-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product_id": "expat-static-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-0:2.0.1-13.el6_8.s390x", "product_id": "expat-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-28T19:35:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2824" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" } ] }
var-201605-0145
Vulnerability from variot
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. Expat are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. There is a security hole in Expat. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update Advisory ID: RHSA-2018:2486-01 Product: Red Hat JBoss Core Services Advisory URL: https://access.redhat.com/errata/RHSA-2018:2486 Issue date: 2018-08-16 CVE Names: CVE-2016-0718 CVE-2016-7167 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 CVE-2016-8625 CVE-2016-9598 CVE-2017-6004 CVE-2017-7186 CVE-2017-7244 CVE-2017-7245 CVE-2017-7246 CVE-2017-1000254 CVE-2017-1000257 CVE-2018-0500 ==================================================================== 1. Summary:
Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages for Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
This release adds the new Apache HTTP Server 2.4.29 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
Security Fix(es):
- expat: Out-of-bounds heap read on crafted input causing crash (CVE-2016-0718)
- curl: escape and unescape integer overflows (CVE-2016-7167)
- curl: Cookie injection for other servers (CVE-2016-8615)
- curl: Case insensitive password comparison (CVE-2016-8616)
- curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)
- curl: Double-free in curl_maprintf (CVE-2016-8618)
- curl: Double-free in krb5 code (CVE-2016-8619)
- curl: curl_getdate out-of-bounds read (CVE-2016-8621)
- curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)
- curl: Use-after-free via shared cookies (CVE-2016-8623)
- curl: Invalid URL parsing with '#' (CVE-2016-8624)
- curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)
- libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) (CVE-2016-9598)
- pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) (CVE-2017-6004)
- pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)
- pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c) (CVE-2017-7244)
- pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7245)
- pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7246)
- curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)
- curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)
- curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP (CVE-2018-0500)
Details around this issue, including information about the CVE, severity of the issue, and the CVSS score can be found on the CVE page listed in the Reference section below.
The following packages have been upgraded to a newer upstream version: * Curl (7.57.0) * OpenSSL (1.0.2n) * Expat (2.2.5) * PCRE (8.41) * libxml2 (2.9.7)
Acknowledgements:
CVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting this issue. Upstream acknowledges Max Dymond as the original reporter. CVE-2017-1000257: Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz project) as the original reporter. CVE-2018-0500: Red Hat would like to thank the Curl project for reporting this issue.
- Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).
- Bugs fixed (https://bugzilla.redhat.com/):
1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash 1375906 - CVE-2016-7167 curl: escape and unescape integer overflows 1388370 - CVE-2016-8615 curl: Cookie injection for other servers 1388371 - CVE-2016-8616 curl: Case insensitive password comparison 1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication 1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf 1388379 - CVE-2016-8619 curl: Double-free in krb5 code 1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read 1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation 1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies 1388390 - CVE-2016-8624 curl: Invalid URL parsing with '#' 1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host 1408306 - CVE-2016-9598 libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) 1425365 - CVE-2017-6004 pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) 1434504 - CVE-2017-7186 pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) 1437364 - CVE-2017-7244 pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c) 1437367 - CVE-2017-7245 pcre: stack-based buffer overflow write in pcre32_copy_substring 1437369 - CVE-2017-7246 pcre: stack-based buffer overflow write in pcre32_copy_substring 1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read 1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read 1597101 - CVE-2018-0500 curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
- References:
https://access.redhat.com/security/cve/CVE-2016-0718 https://access.redhat.com/security/cve/CVE-2016-7167 https://access.redhat.com/security/cve/CVE-2016-8615 https://access.redhat.com/security/cve/CVE-2016-8616 https://access.redhat.com/security/cve/CVE-2016-8617 https://access.redhat.com/security/cve/CVE-2016-8618 https://access.redhat.com/security/cve/CVE-2016-8619 https://access.redhat.com/security/cve/CVE-2016-8621 https://access.redhat.com/security/cve/CVE-2016-8622 https://access.redhat.com/security/cve/CVE-2016-8623 https://access.redhat.com/security/cve/CVE-2016-8624 https://access.redhat.com/security/cve/CVE-2016-8625 https://access.redhat.com/security/cve/CVE-2016-9598 https://access.redhat.com/security/cve/CVE-2017-6004 https://access.redhat.com/security/cve/CVE-2017-7186 https://access.redhat.com/security/cve/CVE-2017-7244 https://access.redhat.com/security/cve/CVE-2017-7245 https://access.redhat.com/security/cve/CVE-2017-7246 https://access.redhat.com/security/cve/CVE-2017-1000254 https://access.redhat.com/security/cve/CVE-2017-1000257 https://access.redhat.com/security/cve/CVE-2018-0500 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW3WhLtzjgjWX9erEAQgw7g//Qz9zXKXcAGEiJLq910Gqgdj6IeJD7Zy1 lvB63+tVL79Rr7X1/rL8EYNoDYw7+MQJeFgWhCwGFPLJi43O3q5cDANVK8/9nUJp UV5QzGC62ncurV3U4MF8DWUcJYpi2QhvlV3O++0dVjx4ETJgBTBSGUpUeEzcYNjM 3LsNmroNWIURAyNsBzO3KgrQhWwJ3vM5e7X6Xgy44S07Kgs2yrArtcsHYjqlDzzR X3Yo8G97DurTikcIWcXs45w9rdKXNSheGRKL7Jp/mzoqCKV4RbieRM12L05MwXmi ZNTMdhJzd+aA3Kwx9JjOjSv8MJErRioUKZEisaH0VWnwTiQc4sOlIXgMuJBV+ZGo RZz0d4sQ1HkeTQKFHkt85abdEiK6OLtKpdZns0VvqqtfdaHJqitqaAfrvssc3D+R usY7sGrlm4rAyYSddWUlLgrF3KZq7PoxVqj+15NkvBisXPp6xwgSiu8aoxziIiNq 0UWQG7KvdlbmrlzNOBBe96COI3UK36AxUXMK6abPzW6VmlY6O1x2OPPgNcItOFVp /o2p3HalPrucwjfwADBGvlbc+SRUguNdnftvmAG3DO1Oon4OnRdoPerNBkY7QRRC Ke88RWnjA37kZ7bBL3Mag6rX8vIlZoy0g1563AnzvexpXiywy6fU4UNpkCHNulNH oPmWeYAK/SE=5slr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] expat (SSA:2016-359-01)
New expat packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. This update fixes bugs and security issues: Multiple integer overflows in XML_GetBuffer. Fix crash on malformed input. Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. Use more entropy for hash initialization. Resolve troublesome internal call to srand. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: d042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz
Slackware 13.1 package: 649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: dc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz
Slackware 13.37 package: a7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz
Slackware 14.0 package: 3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz
Slackware 14.1 package: 3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz
Slackware 14.2 package: 770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz
Slackware -current package: bc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz
Slackware x86_64 -current package: 4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg expat-2.2.0-i586-1_slack14.2.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Updated to the latest 2.7.x release. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004
OS X El Capitan v10.11.6 and Security Update 2016-004 is now available and addresses the following:
apache_mod_php
Available for:
OS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later
Impact: A remote attacker may be able to execute arbitrary code
Description: Multiple issues existed in PHP versions prior to
5.5.36. These were addressed by updating PHP to version 5.5.36.
CVE-2016-4650
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4647 : Juwei Lin (@fuzzerDOTcn) of Trend Micro
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to determine kernel memory layout Description: An out-of-bounds read was addressed through improved input validation. CVE-2016-4648 : Juwei Lin(@fuzzerDOTcn) of Trend Micro
Audio Available for: OS X El Capitan v10.11 and later Impact: Parsing a maliciously crafted audio file may lead to the disclosure of user information Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2016-4646 : Steven Seeley of Source Incite working with Trend Micro's Zero Day Initiative
Audio Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference was addressed through improved input validation. CVE-2016-4649 : Juwei Lin(@fuzzerDOTcn) of Trend Micro
bsdiff Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow existed in bspatch. This issue was addressed through improved bounds checking. CVE-2014-9862 : an anonymous researcher
CFNetwork Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to view sensitive user information Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed through improved restrictions. CVE-2016-4645 : Abhinav Bansal of Zscaler Inc.
CoreGraphics Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4637 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
CoreGraphics Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to elevate privileges Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2016-4652 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
FaceTime Available for: OS X El Capitan v10.11 and later Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved FaceTime display logic. CVE-2016-4635 : Martin Vigo
Graphics Drivers Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4634 : Stefan Esser of SektionEins
ImageIO Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to cause a denial of service Description: A memory consumption issue was addressed through improved memory handling. CVE-2016-4632 : Evgeny Sidorov of Yandex
ImageIO Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4631 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
ImageIO Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4629 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports) CVE-2016-4630 : Tyler Bohan of Cisco Talos (talosintel.com /vulnerability-reports)
Intel Graphics Driver Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4633 : an anonymous researcher
IOHIDFamily Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A null pointer dereference was addressed through improved input validation. CVE-2016-4626 : Stefan Esser of SektionEins
IOSurface Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A use-after-free was addressed through improved memory management. CVE-2016-4625 : Ian Beer of Google Project Zero
Kernel Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1863 : Ian Beer of Google Project Zero CVE-2016-1864 : Ju Zhu of Trend Micro CVE-2016-4582 : Shrek_wzw and Proteas of Qihoo 360 Nirvan Team
Kernel Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a system denial of service Description: A null pointer dereference was addressed through improved input validation. CVE-2016-1865 : CESG, Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent
libc++abi Available for: OS X El Capitan v10.11 and later Impact: An application may be able to execute arbitrary code with root privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4621 : an anonymous researcher
libexpat Available for: OS X El Capitan v10.11 and later Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-0718 : Gustavo Grieco
LibreSSL Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple issues existed in LibreSSL before 2.2.7. These were addressed by updating LibreSSL to version 2.2.7. CVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google) Mark Brand, Ian Beer of Google Project Zero CVE-2016-2109 : Brian Carpenter
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: An access issue existed in the parsing of maliciously crafted XML files. This issue was addressed through improved input validation. CVE-2016-4449 : Kostya Serebryany
libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in libxml2 Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-4447 : Wei Lei and Liu Yang of Nanyang Technological University CVE-2016-4448 : Apple CVE-2016-4483 : Gustavo Grieco CVE-2016-4614 : Nick Wellnhofe CVE-2016-4615 : Nick Wellnhofer CVE-2016-4616 : Michael Paddon CVE-2016-4619 : Hanno Boeck
libxslt Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 and later Impact: Multiple vulnerabilities in libxslt Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-1684 : Nicolas GrA(c)goire CVE-2016-4607 : Nick Wellnhofer CVE-2016-4608 : Nicolas GrA(c)goire CVE-2016-4609 : Nick Wellnhofer CVE-2016-4610 : Nick Wellnhofer CVE-2016-4612 : Nicolas GrA(c)goire
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code leading to compromise of user information Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4640 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to execute arbitrary code leading to the compromise of user information Description: A type confusion issue was addressed through improved memory handling. CVE-2016-4641 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A local user may be able to cause a denial of service Description: A memory initialization issue was addressed through improved memory handling. CVE-2016-4639 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
Login Window Available for: OS X El Capitan v10.11 and later Impact: A malicious application may be able to gain root privileges Description: A type confusion issue was addressed through improved memory handling. CVE-2016-4638 : Yubin Fu of Tencent KeenLab working with Trend Micro's Zero Day Initiative
OpenSSL Available for: OS X El Capitan v10.11 and later Impact: A remote attacker may be able to execute arbitrary code Description: Multiple issues existed in OpenSSL. These issues were resolved by backporting the fixes from OpenSSL 1.0.2h/1.0.1 to OpenSSL 0.9.8. CVE-2016-2105 : Guido Vranken CVE-2016-2106 : Guido Vranken CVE-2016-2107 : Juraj Somorovsky CVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google), Mark Brand and Ian Beer of Google Project Zero CVE-2016-2109 : Brian Carpenter CVE-2016-2176 : Guido Vranken
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted FlashPix Bitmap Image may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4596 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4597 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4600 : Ke Liu of Tencent's Xuanwu Lab CVE-2016-4602 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4598 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted SGI file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4601 : Ke Liu of Tencent's Xuanwu Lab
QuickTime Available for: OS X El Capitan v10.11 and later Impact: Processing a maliciously crafted Photoshop document may lead to unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4599 : Ke Liu of Tencent's Xuanwu Lab
Safari Login AutoFill Available for: OS X El Capitan v10.11 and later Impact: A user's password may be visible on screen Description: An issue existed in Safari's password auto-fill. This issue was addressed through improved matching of form fields. CVE-2016-4595 : Jonathan Lewis from DeARX Services (PTY) LTD
Sandbox Profiles Available for: OS X El Capitan v10.11 and later Impact: A local application may be able to access the process list Description: An access issue existed with privileged API calls. This issue was addressed through additional restrictions. CVE-2016-4594 : Stefan Esser of SektionEins
Note: OS X El Capitan 10.11.6 includes the security content of Safari 9.1.2. For further details see https://support.apple.com/kb/HT206900
OS X El Capitan v10.11.6 and Security Update 2016-004 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJXjXAvAAoJEIOj74w0bLRG/5EP/2v9SJTrO+/4b3A1gqC1ch8y +cJ04tXRsO7rvjKT5nCylo30U0Sanz/bUbDx4559YS7/P/IyeyZVheaTJwK8wzEy pSOPpy35hUuVIw0/p4YsuHDThSBPFMmDljTxH7elkfuBV1lPSrCkyDXc0re2HxWV xj68zAxtM0jkkhgcxb2ApZSZVXhrjUZtbY0xEVOoWKKFwbMvKfx+4xSqunwQeS1u wevs1EbxfvsZbc3pG+xYcOonbegBzOy9aCvNO1Yv1zG+AYXC5ERMq1vk3PsWOTQN ZVY1I7mvCaEfvmjq2isRw8XYapAIKISDLwMKBSYrZDQFwPQLRi1VXxQZ67Kq1M3k ah04/lr0RIcoosIcBqxD2+1UAFjUzEUNFkYivjhuaeegN2QdL7Ujegf1QjdAt8lk mmKduxYUDOaRX50Kw7n14ZveJqzE1D5I6QSItaZ9M1vR60a7u91DSj9D87vbt1YC JM/Rvf/4vonp1NjwA2JQwCiZfYliBDdn9iiCl8mzxdsSRD/wXcZCs05nnKmKsCfc 55ET7IwdG3622lVheOJGQZuucwJiTn36zC11XVzZysQd/hLD5rUKUQNX1WOgZdzs xPsslXF5MWx9jcdyWVSWxDrN0sFk+GpQFQDuVozP60xuxqR3qQ0TXir2NP39uIF5 YozOGPQFmX0OviWCQsX6 =ng+m -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-03-28-2 Additional information for APPLE-SA-2017-03-22-1 iTunes for Windows 12.6
iTunes for Windows 12.6 addresses the following:
APNs Server Available for: Windows 7 and later Impact: An attacker in a privileged network position can track a user's activity Description: A client certificate was sent in plaintext. ============================================================================ Ubuntu Security Notice USN-2983-1 May 18, 2016
expat vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Expat could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - expat: XML parsing C library
Details:
Gustavo Grieco discovered that Expat incorrectly handled malformed XML data. (CVE-2016-0718)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: lib64expat1 2.1.0-7ubuntu0.16.04.1 libexpat1 2.1.0-7ubuntu0.16.04.1
Ubuntu 15.10: lib64expat1 2.1.0-7ubuntu0.15.10.1 libexpat1 2.1.0-7ubuntu0.15.10.1
Ubuntu 14.04 LTS: lib64expat1 2.1.0-4ubuntu1.2 libexpat1 2.1.0-4ubuntu1.2
Ubuntu 12.04 LTS: lib64expat1 2.0.1-7.2ubuntu1.3 libexpat1 2.0.1-7.2ubuntu1.3
After a standard system upgrade you need to restart any applications linked against Expat to effect the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0145", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux enterprise server", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "leap", "scope": "eq", "trust": 1.8, "vendor": "opensuse", "version": "42.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "studio onsite", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "1.3" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "8.0" }, { "model": "policy auditor", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "6.5.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.6.2" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.3.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.5.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "2.7.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.4.7" }, { "model": "firefox", "scope": "lt", "trust": 1.0, "vendor": "mozilla", "version": "48.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.6.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.4.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.5" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.11.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.5.4" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "2.7.15" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.3.7" }, { "model": "libexpat", "scope": "lt", "trust": 1.0, "vendor": "libexpat", "version": "2.2.0" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11.6" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "12.04 lts" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "16.04 lts" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "expat", "scope": null, "trust": 0.8, "vendor": "expat", "version": null }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "15.10" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "14.04 lts" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.11" }, { "model": "gnu/linux", "scope": "eq", "trust": 0.8, "vendor": "debian", "version": "8.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31" }, { "model": "big-ip afm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.6" }, { "model": "big-ip gtm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.9" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.7" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "11.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36.0.4" }, { "model": "big-ip afm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.11" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "20.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.4" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.3" }, { "model": "expat 2.1.0-6+deb8u2", "scope": "ne", "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.2" }, { "model": "big-ip pem hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.1.0.0" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.12" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.16" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.4" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14.01" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "22.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.7" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "26" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.20" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36.0.3" }, { "model": "big-ip afm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "40" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "33" }, { "model": "big-ip pem hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.9" }, { "model": "big-ip gtm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip aam hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "47" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.3" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "35" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.1" }, { "model": "big-ip afm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "big-ip pem hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.08" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "44" }, { "model": "big-ip link controller hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "big-ip ltm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37" }, { "model": "big-ip link controller hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.6" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0-" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10.1" }, { "model": "big-ip link controller hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "27.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "20.0" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.2" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.12" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.0.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.15" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip dns build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.24" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.1" }, { "model": "big-ip pem hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6.0.2" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.7" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "big-ip ltm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "8.0.1" }, { "model": "big-ip link controller hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7.0.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "28" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.7" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.1" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.6" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip afm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.2" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.3" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.18" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.10" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.8" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip analytics hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "25.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.10" }, { "model": "big-ip link controller hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.23" }, { "model": "big-ip aam hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.1" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "8.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16.0.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.26" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "9.0.1" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.27" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.1" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip analytics hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.13" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.2" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "2.1.1-1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "38" }, { "model": "big-ip ltm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.1" }, { "model": "expat 2.1.0-1+deb7u2", "scope": null, "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.8" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "big-ip ltm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.14" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.7" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "41.0.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.12" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "44.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "41" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.4" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.9" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.1" }, { "model": "big-ip gtm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "big-ip ltm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.6" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.16" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.6" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip afm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.25" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "expat 2.1.0-6+deb8u1", "scope": null, "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.6" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "40.0.3" }, { "model": "big-ip asm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "15" }, { "model": "big-ip asm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.5" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.22" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.9" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.3" }, { "model": "big-ip pem hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.6.1" }, { "model": "big-ip aam hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.7" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.17" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.10" }, { "model": "big-ip afm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip afm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.3" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "27" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.14" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.1" }, { "model": "big-ip aam hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "30" }, { "model": "big-ip analytics hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip analytics build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14.0.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "29" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.1" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.6" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "32.0.3" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.5" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.2" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.4" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "big-ip dns hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.3" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "expat", "version": "2.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.5" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.28" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0.1" }, { "model": "big-ip aam hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.4" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.1.0" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16.0.2" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "solaris sru11.6", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.10" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.512" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "35.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.3" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.1" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "23.0" }, { "model": "big-ip gtm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "32" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0.1" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "48" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "42" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6.0.1" }, { "model": "big-ip dns hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.10" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0" }, { "model": "big-ip analytics hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.14" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.12" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "9.0" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "5.0.1" }, { "model": "big-ip aam build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.19" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.16" }, { "model": "big-ip gtm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "22.04917" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.12" }, { "model": "big-ip websafe hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "46" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "23.0.1" }, { "model": "big-ip asm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "34.0.5" }, { "model": "big-ip pem hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "5.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "21.0" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "39.0.3" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "28.0.1" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "15.0.1" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "25.0.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.8" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.020" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2016" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "45" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "39" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "websphere application server liberty profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.14" }, { "model": "big-ip dns hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.2" }, { "model": "big-ip gtm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.4" }, { "model": "big-ip asm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9" }, { "model": "big-ip afm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.10" }, { "model": "netezza analytics", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2.3.0" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.8" }, { "model": "big-ip analytics hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.4" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "34" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "13.0.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.21" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.11" }, { "model": "big-ip asm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.21" }, { "model": "big-ip ltm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.3" }, { "model": "big-ip ltm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.16" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "expat", "version": "2.1.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip websafe hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.19" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.2" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "29.0.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" } ], "sources": [ { "db": "BID", "id": "90729" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:canonical:ubuntu", "vulnerable": true }, { "cpe22Uri": "cpe:/o:debian:debian_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/a:libexpat:expat", "vulnerable": true }, { "cpe22Uri": "cpe:/a:mozilla:firefox", "vulnerable": true }, { "cpe22Uri": "cpe:/o:opensuse_project:leap", "vulnerable": true }, { "cpe22Uri": "cpe:/a:suse:linux_enterprise_debuginfo", "vulnerable": true }, { "cpe22Uri": "cpe:/o:suse:linux_enterprise_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:suse:linux_enterprise_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:suse:linux_enterprise_software_development_kit", "vulnerable": true }, { "cpe22Uri": "cpe:/a:suse:studio_onsite", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002931" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gustavo Grieco", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 }, "cve": "CVE-2016-0718", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-0718", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-88228", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-0718", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0718", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0718", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-0718", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-88228", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-0718", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. Expat are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. There is a security hole in Expat. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update\nAdvisory ID: RHSA-2018:2486-01\nProduct: Red Hat JBoss Core Services\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2486\nIssue date: 2018-08-16\nCVE Names: CVE-2016-0718 CVE-2016-7167 CVE-2016-8615\n CVE-2016-8616 CVE-2016-8617 CVE-2016-8618\n CVE-2016-8619 CVE-2016-8621 CVE-2016-8622\n CVE-2016-8623 CVE-2016-8624 CVE-2016-8625\n CVE-2016-9598 CVE-2017-6004 CVE-2017-7186\n CVE-2017-7244 CVE-2017-7245 CVE-2017-7246\n CVE-2017-1000254 CVE-2017-1000257 CVE-2018-0500\n====================================================================\n1. Summary:\n\nRed Hat JBoss Core Services Pack Apache Server 2.4.29 packages for\nMicrosoft Windows and Oracle Solaris are now available. \n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nThis release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering. \n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release. \n\nSecurity Fix(es):\n\n* expat: Out-of-bounds heap read on crafted input causing crash\n(CVE-2016-0718)\n* curl: escape and unescape integer overflows (CVE-2016-7167)\n* curl: Cookie injection for other servers (CVE-2016-8615)\n* curl: Case insensitive password comparison (CVE-2016-8616)\n* curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)\n* curl: Double-free in curl_maprintf (CVE-2016-8618)\n* curl: Double-free in krb5 code (CVE-2016-8619)\n* curl: curl_getdate out-of-bounds read (CVE-2016-8621)\n* curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)\n* curl: Use-after-free via shared cookies (CVE-2016-8623)\n* curl: Invalid URL parsing with \u0027#\u0027 (CVE-2016-8624)\n* curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)\n* libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)\n(CVE-2016-9598)\n* pcre: Out-of-bounds read in compile_bracket_matchingpath function\n(8.41/3) (CVE-2017-6004)\n* pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)\n* pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c)\n(CVE-2017-7244)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring\n(CVE-2017-7245)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring\n(CVE-2017-7246)\n* curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)\n* curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)\n* curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading\ndata over SMTP (CVE-2018-0500)\n\nDetails around this issue, including information about the CVE, severity of\nthe issue, and the CVSS score can be found on the CVE page listed in the\nReference section below. \n\nThe following packages have been upgraded to a newer upstream version:\n* Curl (7.57.0)\n* OpenSSL (1.0.2n)\n* Expat (2.2.5)\n* PCRE (8.41)\n* libxml2 (2.9.7)\n\nAcknowledgements:\n\nCVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting\nthis issue. \nUpstream acknowledges Max Dymond as the original reporter. \nCVE-2017-1000257: Red Hat would like to thank the Curl project for\nreporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz\nproject) as the original reporter. \nCVE-2018-0500: Red Hat would like to thank the Curl project for reporting\nthis issue. \n\n3. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Core Services installation (including all\napplications and configuration files). \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash\n1375906 - CVE-2016-7167 curl: escape and unescape integer overflows\n1388370 - CVE-2016-8615 curl: Cookie injection for other servers\n1388371 - CVE-2016-8616 curl: Case insensitive password comparison\n1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication\n1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf\n1388379 - CVE-2016-8619 curl: Double-free in krb5 code\n1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read\n1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation\n1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies\n1388390 - CVE-2016-8624 curl: Invalid URL parsing with \u0027#\u0027\n1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host\n1408306 - CVE-2016-9598 libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)\n1425365 - CVE-2017-6004 pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)\n1434504 - CVE-2017-7186 pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)\n1437364 - CVE-2017-7244 pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)\n1437367 - CVE-2017-7245 pcre: stack-based buffer overflow write in pcre32_copy_substring\n1437369 - CVE-2017-7246 pcre: stack-based buffer overflow write in pcre32_copy_substring\n1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read\n1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read\n1597101 - CVE-2018-0500 curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0718\nhttps://access.redhat.com/security/cve/CVE-2016-7167\nhttps://access.redhat.com/security/cve/CVE-2016-8615\nhttps://access.redhat.com/security/cve/CVE-2016-8616\nhttps://access.redhat.com/security/cve/CVE-2016-8617\nhttps://access.redhat.com/security/cve/CVE-2016-8618\nhttps://access.redhat.com/security/cve/CVE-2016-8619\nhttps://access.redhat.com/security/cve/CVE-2016-8621\nhttps://access.redhat.com/security/cve/CVE-2016-8622\nhttps://access.redhat.com/security/cve/CVE-2016-8623\nhttps://access.redhat.com/security/cve/CVE-2016-8624\nhttps://access.redhat.com/security/cve/CVE-2016-8625\nhttps://access.redhat.com/security/cve/CVE-2016-9598\nhttps://access.redhat.com/security/cve/CVE-2017-6004\nhttps://access.redhat.com/security/cve/CVE-2017-7186\nhttps://access.redhat.com/security/cve/CVE-2017-7244\nhttps://access.redhat.com/security/cve/CVE-2017-7245\nhttps://access.redhat.com/security/cve/CVE-2017-7246\nhttps://access.redhat.com/security/cve/CVE-2017-1000254\nhttps://access.redhat.com/security/cve/CVE-2017-1000257\nhttps://access.redhat.com/security/cve/CVE-2018-0500\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\noPmWeYAK/SE=5slr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n[slackware-security] expat (SSA:2016-359-01)\n\nNew expat packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\n14.2, and -current to fix security issues. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. \n This update fixes bugs and security issues:\n Multiple integer overflows in XML_GetBuffer. \n Fix crash on malformed input. \n Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. \n Use more entropy for hash initialization. \n Resolve troublesome internal call to srand. \n For more information, see:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\nd042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\ndc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\na7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\n770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz\n\nSlackware -current package:\nbc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz\n\nSlackware x86_64 -current package:\n4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg expat-2.2.0-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n Updated to the latest 2.7.x release. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update\n2016-004\n\nOS X El Capitan v10.11.6 and Security Update 2016-004 is now\navailable and addresses the following:\n\napache_mod_php\nAvailable for: \nOS X Yosemite v10.10.5 and OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in PHP versions prior to\n5.5.36. These were addressed by updating PHP to version 5.5.36. \nCVE-2016-4650\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-2016-4647 : Juwei Lin (@fuzzerDOTcn) of Trend Micro\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An out-of-bounds read was addressed through improved\ninput validation. \nCVE-2016-4648 : Juwei Lin(@fuzzerDOTcn) of Trend Micro\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Parsing a maliciously crafted audio file may lead to the\ndisclosure of user information\nDescription: An out-of-bounds read was addressed through improved\nbounds checking. \nCVE-2016-4646 : Steven Seeley of Source Incite working with Trend\nMicro\u0027s Zero Day Initiative\n\nAudio\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-4649 : Juwei Lin(@fuzzerDOTcn) of Trend Micro\n\nbsdiff\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow existed in bspatch. This issue was\naddressed through improved bounds checking. \nCVE-2014-9862 : an anonymous researcher\n\nCFNetwork\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to view sensitive user information\nDescription: A permissions issue existed in the handling of web\nbrowser cookies. This issue was addressed through improved\nrestrictions. \nCVE-2016-4645 : Abhinav Bansal of Zscaler Inc. \n\nCoreGraphics\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-2016-4637 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nCoreGraphics\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to elevate privileges\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-2016-4652 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nFaceTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: An attacker in a privileged network position may be able to\ncause a relayed call to continue transmitting audio while appearing\nas if the call terminated\nDescription: User interface inconsistencies existed in the handling\nof relayed calls. These issues were addressed through improved\nFaceTime display logic. \nCVE-2016-4635 : Martin Vigo\n\nGraphics Drivers\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4634 : Stefan Esser of SektionEins\n\nImageIO\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to cause a denial of service\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2016-4632 : Evgeny Sidorov of Yandex\n\nImageIO\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4631 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nImageIO\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4629 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\nCVE-2016-4630 : Tyler Bohan of Cisco Talos (talosintel.com\n/vulnerability-reports)\n\nIntel Graphics Driver\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with kernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4633 : an anonymous researcher\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-4626 : Stefan Esser of SektionEins\n\nIOSurface\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A use-after-free was addressed through improved memory\nmanagement. \nCVE-2016-4625 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1863 : Ian Beer of Google Project Zero\nCVE-2016-1864 : Ju Zhu of Trend Micro\nCVE-2016-4582 : Shrek_wzw and Proteas of Qihoo 360 Nirvan Team\n\nKernel\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A null pointer dereference was addressed through\nimproved input validation. \nCVE-2016-1865 : CESG, Marco Grassi (@marcograss) of KeenLab\n(@keen_lab), Tencent\n\nlibc++abi\nAvailable for: OS X El Capitan v10.11 and later\nImpact: An application may be able to execute arbitrary code with\nroot privileges\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4621 : an anonymous researcher\n\nlibexpat\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing maliciously crafted XML may lead to unexpected\napplication termination or arbitrary code execution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-0718 : Gustavo Grieco\n\nLibreSSL\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in LibreSSL before 2.2.7. These\nwere addressed by updating LibreSSL to version 2.2.7. \nCVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google) Mark Brand,\nIan Beer of Google Project Zero\nCVE-2016-2109 : Brian Carpenter\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Parsing a maliciously crafted XML document may lead to\ndisclosure of user information\nDescription: An access issue existed in the parsing of maliciously\ncrafted XML files. This issue was addressed through improved input\nvalidation. \nCVE-2016-4449 : Kostya Serebryany\n\nlibxml2\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Multiple vulnerabilities in libxml2\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1836 : Wei Lei and Liu Yang of Nanyang Technological\nUniversity\nCVE-2016-4447 : Wei Lei and Liu Yang of Nanyang Technological\nUniversity\nCVE-2016-4448 : Apple\nCVE-2016-4483 : Gustavo Grieco\nCVE-2016-4614 : Nick Wellnhofe\nCVE-2016-4615 : Nick Wellnhofer\nCVE-2016-4616 : Michael Paddon\nCVE-2016-4619 : Hanno Boeck\n\nlibxslt\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 and later\nImpact: Multiple vulnerabilities in libxslt\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-1684 : Nicolas GrA(c)goire\nCVE-2016-4607 : Nick Wellnhofer\nCVE-2016-4608 : Nicolas GrA(c)goire\nCVE-2016-4609 : Nick Wellnhofer\nCVE-2016-4610 : Nick Wellnhofer\nCVE-2016-4612 : Nicolas GrA(c)goire\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode leading to compromise of user information\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4640 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to execute arbitrary\ncode leading to the compromise of user information\nDescription: A type confusion issue was addressed through improved\nmemory handling. \nCVE-2016-4641 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local user may be able to cause a denial of service\nDescription: A memory initialization issue was addressed through\nimproved memory handling. \nCVE-2016-4639 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nLogin Window\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A malicious application may be able to gain root privileges\nDescription: A type confusion issue was addressed through improved\nmemory handling. \nCVE-2016-4638 : Yubin Fu of Tencent KeenLab working with Trend\nMicro\u0027s Zero Day Initiative\n\nOpenSSL\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A remote attacker may be able to execute arbitrary code\nDescription: Multiple issues existed in OpenSSL. These issues were resolved by backporting the fixes from OpenSSL 1.0.2h/1.0.1 to OpenSSL 0.9.8. \nCVE-2016-2105 : Guido Vranken\nCVE-2016-2106 : Guido Vranken\nCVE-2016-2107 : Juraj Somorovsky\nCVE-2016-2108 : Huzaifa Sidhpurwala (Red Hat), Hanno Boeck, David Benjamin (Google), Mark Brand and Ian Beer of Google Project Zero\nCVE-2016-2109 : Brian Carpenter\nCVE-2016-2176 : Guido Vranken\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted FlashPix Bitmap Image may\nlead to unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues were addressed\nthrough improved memory handling. \nCVE-2016-4596 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4597 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4600 : Ke Liu of Tencent\u0027s Xuanwu Lab\nCVE-2016-4602 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4598 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted SGI file may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4601 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nQuickTime\nAvailable for: OS X El Capitan v10.11 and later\nImpact: Processing a maliciously crafted Photoshop document may lead\nto unexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed through\nimproved input validation. \nCVE-2016-4599 : Ke Liu of Tencent\u0027s Xuanwu Lab\n\nSafari Login AutoFill\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A user\u0027s password may be visible on screen\nDescription: An issue existed in Safari\u0027s password auto-fill. This\nissue was addressed through improved matching of form fields. \nCVE-2016-4595 : Jonathan Lewis from DeARX Services (PTY) LTD\n\nSandbox Profiles\nAvailable for: OS X El Capitan v10.11 and later\nImpact: A local application may be able to access the process list\nDescription: An access issue existed with privileged API calls. This\nissue was addressed through additional restrictions. \nCVE-2016-4594 : Stefan Esser of SektionEins\n\nNote: OS X El Capitan 10.11.6 includes the security content of Safari\n9.1.2. For further details see https://support.apple.com/kb/HT206900\n\n\nOS X El Capitan v10.11.6 and Security Update 2016-004 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nYozOGPQFmX0OviWCQsX6\n=ng+m\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-03-28-2 Additional information for\nAPPLE-SA-2017-03-22-1 iTunes for Windows 12.6\n\niTunes for Windows 12.6 addresses the following:\n\nAPNs Server\nAvailable for: Windows 7 and later\nImpact: An attacker in a privileged network position can track a\nuser\u0027s activity\nDescription: A client certificate was sent in plaintext. ============================================================================\nUbuntu Security Notice USN-2983-1\nMay 18, 2016\n\nexpat vulnerability\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 15.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nExpat could be made to crash or run programs as your login if it opened a\nspecially crafted file. \n\nSoftware Description:\n- expat: XML parsing C library\n\nDetails:\n\nGustavo Grieco discovered that Expat incorrectly handled malformed XML\ndata. (CVE-2016-0718)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n lib64expat1 2.1.0-7ubuntu0.16.04.1\n libexpat1 2.1.0-7ubuntu0.16.04.1\n\nUbuntu 15.10:\n lib64expat1 2.1.0-7ubuntu0.15.10.1\n libexpat1 2.1.0-7ubuntu0.15.10.1\n\nUbuntu 14.04 LTS:\n lib64expat1 2.1.0-4ubuntu1.2\n libexpat1 2.1.0-4ubuntu1.2\n\nUbuntu 12.04 LTS:\n lib64expat1 2.0.1-7.2ubuntu1.3\n libexpat1 2.0.1-7.2ubuntu1.3\n\nAfter a standard system upgrade you need to restart any applications linked\nagainst Expat to effect the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "BID", "id": "90729" }, { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137109" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-88228", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0718", "trust": 3.6 }, { "db": "BID", "id": "90729", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036348", "trust": 1.8 }, { "db": "SECTRACK", "id": "1037705", "trust": 1.8 }, { "db": "SECTRACK", "id": "1036415", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "141350", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2016/05/17/12", "trust": 1.8 }, { "db": "TENABLE", "id": "TNS-2016-20", "trust": 1.8 }, { "db": "MCAFEE", "id": "SB10365", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU94844193", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-002931", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0699", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2593", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "137109", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148973", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "139908", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138181", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137108", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-88228", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-0718", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140275", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147507", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137958", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141937", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "id": "VAR-201605-0145", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ], "trust": 0.5500729599999999 }, "last_update_date": "2024-11-29T21:29:32.687000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/en-us/HT206903" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT206903" }, { "title": "DSA-3582", "trust": 0.8, "url": "https://www.debian.org/security/2016/dsa-3582" }, { "title": "MFSA2016-68", "trust": 0.8, "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "title": "MFSA2016-68", "trust": 0.8, "url": "http://www.mozilla-japan.org/security/announce/2016/mfsa2016-68.html" }, { "title": "SUSE-SU-2016:1512", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "title": "openSUSE-SU-2016", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "title": "SUSE-SU-2016:1508", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "title": "Bug 1296102", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102#c2" }, { "title": "Expat XML Parser", "trust": 0.8, "url": "https://sourceforge.net/projects/expat/" }, { "title": "USN-2983-1", "trust": 0.8, "url": "http://www.ubuntu.com/usn/USN-2983-1/" }, { "title": "Expat Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=61769" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2017/02/28/eset_antivirus_opens_macs_to_remote_execution_as_root/" }, { "title": "Red Hat: Moderate: expat security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20162824 - Security Advisory" }, { "title": "Ubuntu Security Notice: expat vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2983-1" }, { "title": "Mozilla: Mozilla Foundation Security Advisory 2016-68", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=2016-68" }, { "title": "Mozilla: Out-of-bounds read during XML parsing in Expat library", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=ed80349726dbf716de7cec0c272ec473" }, { "title": "Amazon Linux AMI: ALAS-2016-775", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-775" }, { "title": "Ubuntu Security Notice: xmlrpc-c vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3013-1" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182486 - Security Advisory" }, { "title": "Tenable Security Advisories: [R5] Nessus 6.8 Fixes Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-11" }, { "title": "Ubuntu Security Notice: firefox vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3044-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=ac5af5dd99788925425f5747ec672707" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=29d79db4a6421689e55b5a9ce5d2aa60" }, { "title": "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-20" }, { "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=21c0efa2643d707e2f50a501209eb75c" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=13f3551b67d913fba90df4b2c0dae0bf" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d" }, { "title": "afl-cve", "trust": 0.1, "url": "https://github.com/mrash/afl-cve " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.debian.org/security/2016/dsa-3582" }, { "trust": 2.1, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "trust": 2.1, "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/90729" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2018:2486" }, { "trust": 1.9, "url": "http://www.ubuntu.com/usn/usn-2983-1" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036348" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036415" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1037705" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2017/feb/68" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201701-21" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-2824.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3044-1" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/141350/eset-endpoint-antivirus-6-remote-code-execution.html" }, { "trust": 1.8, "url": "http://support.eset.com/ca6333/" }, { "trust": 1.8, "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "trust": 1.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.8, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "trust": 1.8, "url": "https://support.apple.com/ht206903" }, { "trust": 1.8, "url": "https://www.tenable.com/security/tns-2016-20" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10365" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0718" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu94844193/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0718" }, { "trust": 0.7, "url": "https://access.redhat.com/errata/rhsa-2016:2824" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0718" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2016-0718" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2593" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0699/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5300" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4472" }, { "trust": 0.3, "url": "http://expat.sourceforge.net/" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2016/q2/360" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024076" }, { "trust": 0.3, "url": "https://support.f5.com/csp/article/k52320548" }, { "trust": 0.3, "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2016-68/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989336" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21992933" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988026" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988710" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21994401" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6702" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1283" }, { "trust": 0.3, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.3, "url": "https://gpgtools.org" }, { "trust": 0.3, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5300" }, { "trust": 0.2, "url": "http://slackware.com" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4472" }, { "trust": 0.2, "url": "http://osuosl.org)" }, { "trust": 0.2, "url": "http://slackware.com/gpg-key" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6153" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3415" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3270" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6607" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3416" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3717" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3414" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7443" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1148" }, { "trust": 0.2, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1147" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10365" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2983-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=53129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8625" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9598" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-1000254" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8618" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8616" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7245" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7186" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8619" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7246" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-7167" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000257" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-1000257" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-0500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7245" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000254" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7186" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8615" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8615" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8618" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8625" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8623" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-9598" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7167" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8621" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8623" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7246" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-6004" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1283" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9233" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1061" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9233" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0876" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1060" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0876" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9063" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1060" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1061" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4599" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2109" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4601" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2106" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4483" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1836" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4600" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1865" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4597" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4596" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4447" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1863" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4582" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4595" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1864" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9862" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2105" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4448" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4598" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4602" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht206900" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2176" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4594" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5029" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2479" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2383" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2463" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-7ubuntu0.15.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.0.1-7.2ubuntu1.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-7ubuntu0.16.04.1" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "137958" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-26T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2016-05-26T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90729" }, { "date": "2016-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "date": "2018-08-17T17:41:42", "db": "PACKETSTORM", "id": "148973" }, { "date": "2016-12-25T13:15:00", "db": "PACKETSTORM", "id": "140275" }, { "date": "2018-05-05T13:13:00", "db": "PACKETSTORM", "id": "147507" }, { "date": "2017-03-23T16:22:29", "db": "PACKETSTORM", "id": "141796" }, { "date": "2016-07-19T19:45:20", "db": "PACKETSTORM", "id": "137958" }, { "date": "2017-03-28T23:44:44", "db": "PACKETSTORM", "id": "141937" }, { "date": "2016-05-18T15:47:23", "db": "PACKETSTORM", "id": "137109" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2016-05-26T16:59:00.133000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-12T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2023-02-12T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2017-09-25T20:00:00", "db": "BID", "id": "90729" }, { "date": "2016-09-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "date": "2023-04-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2024-11-21T02:42:14.723000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002931" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 } }
ghsa-3f8j-8ww3-q7v6
Vulnerability from github
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
{ "affected": [], "aliases": [ "CVE-2016-0718" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-26T16:59:00Z", "severity": "CRITICAL" }, "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GHSA-3f8j-8ww3-q7v6", "modified": "2022-05-13T01:07:38Z", "published": "2022-05-13T01:07:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201701-21" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "type": "WEB", "url": "https://support.apple.com/HT206903" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2016-20" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "type": "WEB", "url": "http://support.eset.com/ca6333" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90729" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036348" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036415" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037705" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3044-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2016-0718
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-0718", "description": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "references": [ "https://www.suse.com/security/cve/CVE-2016-0718.html", "https://www.debian.org/security/2016/dsa-3582", "https://access.redhat.com/errata/RHSA-2018:2486", "https://access.redhat.com/errata/RHSA-2016:2824", "https://ubuntu.com/security/CVE-2016-0718", "https://advisories.mageia.org/CVE-2016-0718.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-0718.html", "https://linux.oracle.com/cve/CVE-2016-0718.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-0718" ], "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "modified": "2023-12-13T01:21:17.573965Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "http://www.securitytracker.com/id/1036348", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://support.apple.com/HT206903", "refsource": "MISC", "url": "https://support.apple.com/HT206903" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://security.gentoo.org/glsa/201701-21", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-2824.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://seclists.org/fulldisclosure/2017/Feb/68", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://support.eset.com/ca6333/", "refsource": "MISC", "url": "http://support.eset.com/ca6333/" }, { "name": "http://www.debian.org/security/2016/dsa-3582", "refsource": "MISC", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.openwall.com/lists/oss-security/2016/05/17/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "http://www.securityfocus.com/bid/90729", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/90729" }, { "name": "http://www.securitytracker.com/id/1036415", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036415" }, { "name": "http://www.securitytracker.com/id/1037705", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1037705" }, { "name": "http://www.ubuntu.com/usn/USN-2983-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "http://www.ubuntu.com/usn/USN-3044-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2486", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "MISC", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "MISC", "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "48.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.5", "versionStartIncluding": "10.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.5.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.6.2", "versionStartIncluding": "3.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.4", "versionStartIncluding": "3.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.7", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.3.7", "versionStartIncluding": "3.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.7.15", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "name": "DSA-3582", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "USN-2983-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "SUSE-SU-2016:1508", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "SUSE-SU-2016:1512", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "openSUSE-SU-2016:1523", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "APPLE-SA-2016-07-18-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "https://support.apple.com/HT206903", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT206903" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "USN-3044-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "openSUSE-SU-2016:2026", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "openSUSE-SU-2016:1964", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "90729", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "openSUSE-SU-2016:1441", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://support.eset.com/ca6333/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.eset.com/ca6333/" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "GLSA-201701-21", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "1037705", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036415" }, { "name": "1036348", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "RHSA-2016:2824", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-12T23:15Z", "publishedDate": "2016-05-26T16:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.