rhsa-2007_0979
Vulnerability from csaf_redhat
Published
2007-10-19 15:36
Modified
2024-11-22 01:33
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
Updated firefox packages that fix several security bugs are now available
for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
Mozilla Firefox is an open source Web browser.
Several flaws were found in the way in which Firefox processed certain
malformed web content. A web page containing malicious content could cause
Firefox to crash or potentially execute arbitrary code as the user running
Firefox. (CVE-2007-5338, CVE-2007-5339, CVE-2007-5340)
Several flaws were found in the way in which Firefox displayed malformed
web content. A web page containing specially-crafted content could
potentially trick a user into surrendering sensitive information.
(CVE-2007-1095, CVE-2007-3844, CVE-2007-3511, CVE-2007-5334)
A flaw was found in the Firefox sftp protocol handler. A malicious web page
could access data from a remote sftp site, possibly stealing sensitive user
data. (CVE-2007-5337)
A request-splitting flaw was found in the way in which Firefox generates a
digest authentication request. If a user opened a specially-crafted URL, it
was possible to perform cross-site scripting attacks, web cache poisoning,
or other, similar exploits. (CVE-2007-2292)
All users of Firefox are advised to upgrade to these updated packages,
which contain backported patches that correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated firefox packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nSeveral flaws were found in the way in which Firefox processed certain\nmalformed web content. A web page containing malicious content could cause\nFirefox to crash or potentially execute arbitrary code as the user running\nFirefox. (CVE-2007-5338, CVE-2007-5339, CVE-2007-5340)\n\nSeveral flaws were found in the way in which Firefox displayed malformed\nweb content. A web page containing specially-crafted content could\npotentially trick a user into surrendering sensitive information.\n(CVE-2007-1095, CVE-2007-3844, CVE-2007-3511, CVE-2007-5334)\n\nA flaw was found in the Firefox sftp protocol handler. A malicious web page\ncould access data from a remote sftp site, possibly stealing sensitive user\ndata. (CVE-2007-5337)\n\nA request-splitting flaw was found in the way in which Firefox generates a\ndigest authentication request. If a user opened a specially-crafted URL, it\nwas possible to perform cross-site scripting attacks, web cache poisoning,\nor other, similar exploits. (CVE-2007-2292)\n\nAll users of Firefox are advised to upgrade to these updated packages,\nwhich contain backported patches that correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0979", "url": "https://access.redhat.com/errata/RHSA-2007:0979" }, { "category": "external", "summary": "http://en.wikipedia.org/wiki/HTTP_response_splitting", "url": "http://en.wikipedia.org/wiki/HTTP_response_splitting" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "246248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=246248" }, { "category": "external", "summary": "333991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=333991" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0979.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T01:33:02+00:00", "generator": { "date": "2024-11-22T01:33:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0979", "initial_release_date": "2007-10-19T15:36:00+00:00", "revision_history": [ { "date": "2007-10-19T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-01-08T19:44:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:33:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.src", "product": { "name": "firefox-0:1.5.0.12-6.el5.src", "product_id": "firefox-0:1.5.0.12-6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=src" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.src", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.src", "product_id": "firefox-0:1.5.0.12-0.7.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.x86_64", "product": { "name": "firefox-0:1.5.0.12-6.el5.x86_64", "product_id": "firefox-0:1.5.0.12-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.x86_64", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.x86_64", "product_id": "firefox-0:1.5.0.12-0.7.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.i386", "product": { "name": "firefox-0:1.5.0.12-6.el5.i386", "product_id": "firefox-0:1.5.0.12-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.i386", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.i386", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.i386", "product_id": "firefox-0:1.5.0.12-0.7.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.ia64", "product": { "name": "firefox-0:1.5.0.12-6.el5.ia64", "product_id": "firefox-0:1.5.0.12-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.ia64", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.ia64", "product_id": "firefox-0:1.5.0.12-0.7.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.ppc", "product": { "name": "firefox-0:1.5.0.12-6.el5.ppc", "product_id": "firefox-0:1.5.0.12-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.ppc", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.ppc", "product_id": "firefox-0:1.5.0.12-0.7.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.s390", "product": { "name": "firefox-0:1.5.0.12-6.el5.s390", "product_id": "firefox-0:1.5.0.12-6.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.s390", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.s390", "product_id": "firefox-0:1.5.0.12-0.7.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "firefox-0:1.5.0.12-6.el5.s390x", "product": { "name": "firefox-0:1.5.0.12-6.el5.s390x", "product_id": "firefox-0:1.5.0.12-6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-6.el5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "product_id": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-6.el5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "product": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "product_id": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@1.5.0.12-0.7.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:1.5.0.12-0.7.el4.s390x", "product": { "name": "firefox-0:1.5.0.12-0.7.el4.s390x", "product_id": "firefox-0:1.5.0.12-0.7.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@1.5.0.12-0.7.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.src" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.src" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.src" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.src" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.i386" }, "product_reference": "firefox-0:1.5.0.12-6.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.ia64" }, "product_reference": "firefox-0:1.5.0.12-6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.ppc" }, "product_reference": "firefox-0:1.5.0.12-6.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.s390" }, "product_reference": "firefox-0:1.5.0.12-6.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.s390x" }, "product_reference": "firefox-0:1.5.0.12-6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.src" }, "product_reference": "firefox-0:1.5.0.12-6.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:1.5.0.12-6.el5.x86_64" }, "product_reference": "firefox-0:1.5.0.12-6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.i386" }, "product_reference": "firefox-0:1.5.0.12-6.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.ia64" }, "product_reference": "firefox-0:1.5.0.12-6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.ppc" }, "product_reference": "firefox-0:1.5.0.12-6.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.s390" }, "product_reference": "firefox-0:1.5.0.12-6.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.s390x" }, "product_reference": "firefox-0:1.5.0.12-6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.src" }, "product_reference": "firefox-0:1.5.0.12-6.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:1.5.0.12-6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:1.5.0.12-6.el5.x86_64" }, "product_reference": "firefox-0:1.5.0.12-6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" }, "product_reference": "firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1095", "discovery_date": "2007-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618294" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1095" }, { "category": "external", "summary": "RHBZ#1618294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618294" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1095" } ], "release_date": "2007-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2007-2292", "discovery_date": "2007-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618308" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2292" }, { "category": "external", "summary": "RHBZ#1618308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2292", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2292" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2292", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2292" } ], "release_date": "2007-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2007-3511", "discovery_date": "2007-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618316" } ], "notes": [ { "category": "description", "text": "The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the \"for\" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3511" }, { "category": "external", "summary": "RHBZ#1618316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3511", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3511" } ], "release_date": "2007-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2007-3844", "discovery_date": "2007-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "250648" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka \"Cross Context Scripting.\" NOTE: this issue is caused by a CVE-2007-3089 regression.", "title": "Vulnerability description" }, { "category": "summary", "text": "about: blank windows", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250648\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3844" }, { "category": "external", "summary": "RHBZ#250648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3844", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3844" } ], "release_date": "2007-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "about: blank windows" }, { "cve": "CVE-2007-5334", "discovery_date": "2007-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618324" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window\u0027s titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5334" }, { "category": "external", "summary": "RHBZ#1618324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5334", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5334" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5334", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5334" } ], "release_date": "2007-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2007-5337", "discovery_date": "2007-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618325" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5337" }, { "category": "external", "summary": "RHBZ#1618325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618325" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5337", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5337" } ], "release_date": "2007-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2007-5338", "discovery_date": "2007-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618326" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5338" }, { "category": "external", "summary": "RHBZ#1618326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5338", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5338" } ], "release_date": "2007-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2007-5339", "discovery_date": "2007-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618328" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption or assert errors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5339" }, { "category": "external", "summary": "RHBZ#1618328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618328" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5339", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5339" } ], "release_date": "2007-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2007-5340", "discovery_date": "2007-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618329" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5340" }, { "category": "external", "summary": "RHBZ#1618329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5340", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5340" } ], "release_date": "2007-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-19T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:firefox-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-0:1.5.0.12-0.7.el4.src", "4AS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4AS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-0:1.5.0.12-0.7.el4.src", "4Desktop:firefox-0:1.5.0.12-0.7.el4.x86_64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4Desktop:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-0:1.5.0.12-0.7.el4.src", "4ES:firefox-0:1.5.0.12-0.7.el4.x86_64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4ES:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-0:1.5.0.12-0.7.el4.src", "4WS:firefox-0:1.5.0.12-0.7.el4.x86_64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.i386", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ia64", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.ppc", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.s390x", "4WS:firefox-debuginfo-0:1.5.0.12-0.7.el4.x86_64", "5Client:firefox-0:1.5.0.12-6.el5.i386", "5Client:firefox-0:1.5.0.12-6.el5.ia64", "5Client:firefox-0:1.5.0.12-6.el5.ppc", "5Client:firefox-0:1.5.0.12-6.el5.s390", "5Client:firefox-0:1.5.0.12-6.el5.s390x", "5Client:firefox-0:1.5.0.12-6.el5.src", "5Client:firefox-0:1.5.0.12-6.el5.x86_64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Client:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-0:1.5.0.12-6.el5.i386", "5Server:firefox-0:1.5.0.12-6.el5.ia64", "5Server:firefox-0:1.5.0.12-6.el5.ppc", "5Server:firefox-0:1.5.0.12-6.el5.s390", "5Server:firefox-0:1.5.0.12-6.el5.s390x", "5Server:firefox-0:1.5.0.12-6.el5.src", "5Server:firefox-0:1.5.0.12-6.el5.x86_64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.i386", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ia64", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.ppc", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.s390x", "5Server:firefox-debuginfo-0:1.5.0.12-6.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0979" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.