Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-1558 (GCVE-0-2007-1558)
Vulnerability from cvelistv5 – Published: 2007-04-16 22:00 – Updated: 2024-08-07 12:59- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:59:08.708Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "25496",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25496"
},
{
"name": "25529",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25529"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.claws-mail.org/news.php"
},
{
"name": "MDKSA-2007:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name": "2007-0024",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "20070403 Re: APOP vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name": "25894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25894"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "ADV-2007-1939",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "26083",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26083"
},
{
"name": "ADV-2007-1468",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "RHSA-2009:1140",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "HPSBUX02156",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "26415",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26415"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "APPLE-SA-2007-05-24",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "SUSE-SR:2007:014",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "25402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "HPSBUX02153",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "20070402 APOP vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "SUSE-SA:2007:036",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "GLSA-200706-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "25534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25534"
},
{
"name": "ADV-2007-1994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "SSA:2007-152-02",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"name": "23257",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "USN-469-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "MDKSA-2007:131",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "DSA-1305",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "ADV-2007-1467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "ADV-2007-2788",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "SSRT061236",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "25664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25664"
},
{
"name": "MDKSA-2007:119",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "25546",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25546"
},
{
"name": "RHSA-2007:0353",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "RHSA-2007:0385",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "25858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25858"
},
{
"name": "25798",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25353",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25353"
},
{
"name": "ADV-2008-0082",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "RHSA-2007:0401",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "2007-0019",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX",
"x_transferred"
],
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "25476",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25476"
},
{
"name": "35699",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35699"
},
{
"name": "MDKSA-2007:113",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "SSRT061181",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:105",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "RHSA-2007:0386",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "25750",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25750"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "DSA-1300",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "25559",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25559"
},
{
"name": "ADV-2007-1466",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "1018008",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "oval:org.mitre.oval:def:9782",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070602-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI",
"x_transferred"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "RHSA-2007:0402",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "ADV-2007-1480",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "TA07-151A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name": "RHSA-2007:0344",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://balsa.gnome.org/download.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-04-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "25496",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25496"
},
{
"name": "25529",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25529"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.claws-mail.org/news.php"
},
{
"name": "MDKSA-2007:107",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name": "2007-0024",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "20070403 Re: APOP vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name": "25894",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25894"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "ADV-2007-1939",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "26083",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26083"
},
{
"name": "ADV-2007-1468",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "RHSA-2009:1140",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "HPSBUX02156",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "26415",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26415"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "APPLE-SA-2007-05-24",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "SUSE-SR:2007:014",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "25402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "HPSBUX02153",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "20070402 APOP vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "SUSE-SA:2007:036",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "GLSA-200706-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "25534",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25534"
},
{
"name": "ADV-2007-1994",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "SSA:2007-152-02",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"name": "23257",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "USN-469-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "MDKSA-2007:131",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "DSA-1305",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "ADV-2007-1467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "ADV-2007-2788",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "SSRT061236",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "25664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25664"
},
{
"name": "MDKSA-2007:119",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "25546",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25546"
},
{
"name": "RHSA-2007:0353",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "RHSA-2007:0385",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "25858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25858"
},
{
"name": "25798",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25353",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25353"
},
{
"name": "ADV-2008-0082",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "RHSA-2007:0401",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "2007-0019",
"tags": [
"vendor-advisory",
"x_refsource_TRUSTIX"
],
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "25476",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25476"
},
{
"name": "35699",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35699"
},
{
"name": "MDKSA-2007:113",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "SSRT061181",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:105",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "RHSA-2007:0386",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "25750",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25750"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "DSA-1300",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "25559",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25559"
},
{
"name": "ADV-2007-1466",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "1018008",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "oval:org.mitre.oval:def:9782",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070602-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "RHSA-2007:0402",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "ADV-2007-1480",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "USN-520-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "TA07-151A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name": "RHSA-2007:0344",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://balsa.gnome.org/download.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1558",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25496",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25496"
},
{
"name": "25529",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25529"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=683706",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "http://www.claws-mail.org/news.php",
"refsource": "CONFIRM",
"url": "http://www.claws-mail.org/news.php"
},
{
"name": "MDKSA-2007:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name": "2007-0024",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "20070403 Re: APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name": "25894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25894"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "26083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26083"
},
{
"name": "ADV-2007-1468",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "RHSA-2009:1140",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "26415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26415"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "SUSE-SR:2007:014",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "25402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25402"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "20070402 APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "SUSE-SA:2007:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "GLSA-200706-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"name": "http://sylpheed.sraoss.jp/en/news.html",
"refsource": "CONFIRM",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "25534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25534"
},
{
"name": "ADV-2007-1994",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "SSA:2007-152-02",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"name": "23257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "USN-469-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "MDKSA-2007:131",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "DSA-1305",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"name": "https://issues.rpath.com/browse/RPL-1231",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "ADV-2007-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "ADV-2007-2788",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "https://issues.rpath.com/browse/RPL-1424",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "25664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25664"
},
{
"name": "MDKSA-2007:119",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "25546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25546"
},
{
"name": "RHSA-2007:0353",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "RHSA-2007:0385",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "25858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25858"
},
{
"name": "25798",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25353"
},
{
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "RHSA-2007:0401",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "2007-0019",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "25476",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25476"
},
{
"name": "35699",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35699"
},
{
"name": "MDKSA-2007:113",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"refsource": "MLIST",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:105",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "RHSA-2007:0386",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1232",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "25750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25750"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "DSA-1300",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "25559",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25559"
},
{
"name": "ADV-2007-1466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "1018008",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "oval:org.mitre.oval:def:9782",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070602-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "RHSA-2007:0402",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "ADV-2007-1480",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "TA07-151A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name": "RHSA-2007:0344",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"name": "http://balsa.gnome.org/download.html",
"refsource": "CONFIRM",
"url": "http://balsa.gnome.org/download.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-1558",
"datePublished": "2007-04-16T22:00:00.000Z",
"dateReserved": "2007-03-20T00:00:00.000Z",
"dateUpdated": "2024-08-07T12:59:08.708Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-1558",
"date": "2026-04-13",
"epss": "0.1342",
"percentile": "0.94196"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-1558\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-04-16T22:19:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.\"},{\"lang\":\"es\",\"value\":\"El protocolo APOP permite a los atacantes remotos adivinar los primeros 3 caracteres de una contrase\u00f1a por medio de ataques de tipo man-in-the-middle (MITM) que utilizan ID de mensajes creados y colisiones MD5. NOTA: este problema a nivel de creaci\u00f3n afecta potencialmente a todos los productos que utilizan APOP, incluyendo (1) Thunderbird versi\u00f3n 1.x anterior a la versi\u00f3n 1.5.0.12 y versi\u00f3n 2.x anterior a la versi\u00f3n 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail anterior a la versi\u00f3n 6.3.8, (5) SeaMonkey versi\u00f3n 1.0.x anterior a la versi\u00f3n 1.0.9 y versi\u00f3n 1.1.x anterior a la versi\u00f3n 1.1.2, (6) Balsa versi\u00f3n 2.3.16 y anteriores, (7) Mailfilter anterior a la versi\u00f3n 0.8.2, y posiblemente otros productos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apop_protocol:apop_protocol:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A32BC4-9BE2-429C-9D9A-BE4DF4CD9F77\"}]}]}],\"references\":[{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://balsa.gnome.org/download.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25353\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25402\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25476\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25496\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25529\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25534\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25546\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25559\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25664\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25750\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25798\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25858\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26083\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/26415\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35699\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200706-06.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=683706\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sylpheed.sraoss.jp/en/news.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.claws-mail.org/news.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1300\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1305\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:105\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:107\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:113\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:119\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mozilla.org/security/announce/2007/mfsa2007-15.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_14_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_36_mozilla.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/08/15/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/08/18/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0344.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0353.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0385.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0386.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0401.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0402.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1140.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/464477/30/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/464569/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/470172/100/200/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/471455/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/471720/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/471842/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/23257\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1018008\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.org/errata/2007/0019/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.org/errata/2007/0024/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-469-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-520-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-151A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1466\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1467\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1468\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1480\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1939\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1994\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2788\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0082\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1231\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1232\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1424\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://balsa.gnome.org/download.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25476\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25496\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25546\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/25559\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200706-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=683706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sylpheed.sraoss.jp/en/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.claws-mail.org/news.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1305\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mozilla.org/security/announce/2007/mfsa2007-15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_14_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_36_mozilla.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/08/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/08/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0344.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0353.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0385.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0386.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0401.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0402.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1140.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/464477/30/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/464569/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/470172/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/471455/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/471720/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/471842/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/23257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1018008\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.trustix.org/errata/2007/0019/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.trustix.org/errata/2007/0024/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-469-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-520-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-151A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/1466\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1994\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2788\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.rpath.com/browse/RPL-1424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2007:0385
Vulnerability from csaf_redhat - Published: 2007-06-07 08:07 - Updated: 2025-11-21 17:31The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated fetchmail package that fixes a security bug is now available for\nRed Hat Enterprise Linux 2.1, 3, 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Fetchmail is a remote mail retrieval and forwarding utility intended\nfor use over on-demand TCP/IP links, like SLIP or PPP connections.\n\nA flaw was found in the way fetchmail processed certain APOP authentication\nrequests. By sending certain responses when fetchmail attempted to\nauthenticate against an APOP server, a remote attacker could potentially\nacquire certain portions of a user\u0027s authentication credentials.\n(CVE-2007-1558)\n\nAll users of fetchmail should upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0385",
"url": "https://access.redhat.com/errata/RHSA-2007:0385"
},
{
"category": "external",
"summary": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0385.json"
}
],
"title": "Red Hat Security Advisory: fetchmail security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:41+00:00",
"generator": {
"date": "2025-11-21T17:31:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0385",
"initial_release_date": "2007-06-07T08:07:00+00:00",
"revision_history": [
{
"date": "2007-06-07T08:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:10:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.0.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.ia64",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ia64",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.ia64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.ia64",
"product_id": "fetchmail-0:6.2.0-3.el3.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"product": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"product": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.src",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.src",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.src",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.src",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.src",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.src",
"product_id": "fetchmail-0:6.2.0-3.el3.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"product": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.0.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"product_id": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.0.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.i386",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.i386",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.i386",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.i386",
"product_id": "fetchmail-0:6.2.0-3.el3.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"product": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"product_id": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmailconf@5.9.0-21.7.3.el2.1.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"product": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"product_id": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@5.9.0-21.7.3.el2.1.6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.0.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.ppc",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ppc",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.ppc",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.ppc",
"product_id": "fetchmail-0:6.2.0-3.el3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"product_id": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.3.6-1.0.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.3.6-1.0.1.el5.s390x",
"product": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.s390x",
"product_id": "fetchmail-0:6.3.6-1.0.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.3.6-1.0.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.s390x",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390x",
"product_id": "fetchmail-0:6.2.0-3.el3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"product": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"product_id": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.5-6.0.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"product_id": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.5-6.0.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"product": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"product_id": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail-debuginfo@6.2.0-3.el3.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "fetchmail-0:6.2.0-3.el3.4.s390",
"product": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390",
"product_id": "fetchmail-0:6.2.0-3.el3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fetchmail@6.2.0-3.el3.4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.src"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.src"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src"
},
"product_reference": "fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64"
},
"product_reference": "fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.src"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.src"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.src"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.i386"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.ia64"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.ppc"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.s390x"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.src"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-0:6.3.6-1.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-0:6.3.6-1.0.1.el5.x86_64"
},
"product_reference": "fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64"
},
"product_reference": "fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.4.src",
"3AS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.4.src",
"3ES:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.4.src",
"3WS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-07T08:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.4.src",
"3AS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.4.src",
"3ES:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.4.src",
"3WS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0385"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1AW:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1AW:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1ES:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1ES:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.ia64",
"2.1WS:fetchmail-0:5.9.0-21.7.3.el2.1.6.src",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.i386",
"2.1WS:fetchmailconf-0:5.9.0-21.7.3.el2.1.6.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-0:6.2.0-3.el3.4.src",
"3AS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3AS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.src",
"3Desktop:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3Desktop:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-0:6.2.0-3.el3.4.src",
"3ES:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3ES:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-0:6.2.0-3.el3.4.src",
"3WS:fetchmail-0:6.2.0-3.el3.4.x86_64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.i386",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ia64",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.ppc",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.s390x",
"3WS:fetchmail-debuginfo-0:6.2.0-3.el3.4.x86_64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4AS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4AS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.src",
"4Desktop:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4Desktop:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.src",
"4ES:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4ES:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.src",
"4WS:fetchmail-0:6.2.5-6.0.1.el4.x86_64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.i386",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ia64",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.ppc",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.s390x",
"4WS:fetchmail-debuginfo-0:6.2.5-6.0.1.el4.x86_64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Client-Workstation:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Client-Workstation:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.src",
"5Server:fetchmail-0:6.3.6-1.0.1.el5.x86_64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.i386",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ia64",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.ppc",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.s390x",
"5Server:fetchmail-debuginfo-0:6.3.6-1.0.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
}
]
}
RHSA-2007:0386
Vulnerability from csaf_redhat - Published: 2007-06-04 08:03 - Updated: 2025-11-21 17:31Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via "&" characters in the GECOS field, which triggers the overflow during alias expansion.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated mutt package that fixes several security bugs is now available for\nRed Hat Enterprise Linux 3, 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mutt is a text-mode mail user agent.\n\nA flaw was found in the way Mutt used temporary files on NFS file systems.\nDue to an implementation issue in the NFS protocol, Mutt was not able to\nexclusively open a new file. A local attacker could conduct a\ntime-dependent attack and possibly gain access to e-mail attachments opened\nby a victim. (CVE-2006-5297)\n\nA flaw was found in the way Mutt processed certain APOP authentication\nrequests. By sending certain responses when mutt attempted to authenticate\nagainst an APOP server, a remote attacker could potentially acquire certain\nportions of a user\u0027s authentication credentials. (CVE-2007-1558)\n\nA flaw was found in the way Mutt handled certain characters in gecos fields\nwhich could lead to a buffer overflow. The gecos field is an entry in the\npassword database typically used to record general information about the\nuser. A local attacker could give themselves a carefully crafted \"Real\nName\" which could execute arbitrary code if a victim uses Mutt and expands\nthe attackers alias. (CVE-2007-2683)\n\nAll users of mutt should upgrade to this updated package, which\ncontains a backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0386",
"url": "https://access.redhat.com/errata/RHSA-2007:0386"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "211085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=211085"
},
{
"category": "external",
"summary": "239890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=239890"
},
{
"category": "external",
"summary": "241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0386.json"
}
],
"title": "Red Hat Security Advisory: mutt security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:42+00:00",
"generator": {
"date": "2025-11-21T17:31:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0386",
"initial_release_date": "2007-06-04T08:03:00+00:00",
"revision_history": [
{
"date": "2007-06-04T08:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:02:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.ia64",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.ia64",
"product_id": "mutt-5:1.4.1-12.0.3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=ia64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=ia64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"product": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=ia64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.ia64",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ia64",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=ia64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.ia64",
"product": {
"name": "mutt-5:1.4.1-5.el3.ia64",
"product_id": "mutt-5:1.4.1-5.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=ia64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=ia64\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.src",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.src",
"product_id": "mutt-5:1.4.1-12.0.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=src\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.src",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.src",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=src\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.src",
"product": {
"name": "mutt-5:1.4.1-5.el3.src",
"product_id": "mutt-5:1.4.1-5.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=src\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"product_id": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=x86_64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=x86_64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"product": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=x86_64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=x86_64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.x86_64",
"product": {
"name": "mutt-5:1.4.1-5.el3.x86_64",
"product_id": "mutt-5:1.4.1-5.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=x86_64\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=x86_64\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.i386",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.i386",
"product_id": "mutt-5:1.4.1-12.0.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=i386\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=i386\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"product": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=i386\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.i386",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.i386",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=i386\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.i386",
"product": {
"name": "mutt-5:1.4.1-5.el3.i386",
"product_id": "mutt-5:1.4.1-5.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=i386\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=i386\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.ppc",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.ppc",
"product_id": "mutt-5:1.4.1-12.0.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=ppc\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=ppc\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"product": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=ppc\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.ppc",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ppc",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=ppc\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.ppc",
"product": {
"name": "mutt-5:1.4.1-5.el3.ppc",
"product_id": "mutt-5:1.4.1-5.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=ppc\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=ppc\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.s390",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390",
"product_id": "mutt-5:1.4.1-12.0.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=s390\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=s390\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.s390",
"product": {
"name": "mutt-5:1.4.1-5.el3.s390",
"product_id": "mutt-5:1.4.1-5.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=s390\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=s390\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-5:1.4.1-12.0.3.el4.s390x",
"product": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390x",
"product_id": "mutt-5:1.4.1-12.0.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-12.0.3.el4?arch=s390x\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"product": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"product_id": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-12.0.3.el4?arch=s390x\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"product": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"product_id": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.2.2-3.0.2.el5?arch=s390x\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.2.2-3.0.2.el5.s390x",
"product": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.s390x",
"product_id": "mutt-5:1.4.2.2-3.0.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.2.2-3.0.2.el5?arch=s390x\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-5:1.4.1-5.el3.s390x",
"product": {
"name": "mutt-5:1.4.1-5.el3.s390x",
"product_id": "mutt-5:1.4.1-5.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt@1.4.1-5.el3?arch=s390x\u0026epoch=5"
}
}
},
{
"category": "product_version",
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"product": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"product_id": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mutt-debuginfo@1.4.1-5.el3?arch=s390x\u0026epoch=5"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.src"
},
"product_reference": "mutt-5:1.4.1-5.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.src"
},
"product_reference": "mutt-5:1.4.1-5.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.src"
},
"product_reference": "mutt-5:1.4.1-5.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.src"
},
"product_reference": "mutt-5:1.4.1-5.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-5.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.src"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.src"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.src"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.src"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.i386"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.src"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.i386"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.src"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64"
},
"product_reference": "mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
},
"product_reference": "mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-5297",
"discovery_date": "2006-10-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "211085"
}
],
"notes": [
{
"category": "description",
"text": "Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple mutt tempfile race conditions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\n\nThe risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5297"
},
{
"category": "external",
"summary": "RHBZ#211085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=211085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5297",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5297"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5297",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5297"
}
],
"release_date": "2006-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-04T08:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0386"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple mutt tempfile race conditions"
},
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-04T08:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0386"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
},
{
"cve": "CVE-2007-2683",
"discovery_date": "2007-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "239890"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via \"\u0026\" characters in the GECOS field, which triggers the overflow during alias expansion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Buffer overflow in mutt\u0027s gecos structure handling",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2683"
},
{
"category": "external",
"summary": "RHBZ#239890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=239890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2683",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2683"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2683",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2683"
}
],
"release_date": "2007-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-04T08:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:mutt-5:1.4.1-5.el3.i386",
"3AS:mutt-5:1.4.1-5.el3.ia64",
"3AS:mutt-5:1.4.1-5.el3.ppc",
"3AS:mutt-5:1.4.1-5.el3.s390",
"3AS:mutt-5:1.4.1-5.el3.s390x",
"3AS:mutt-5:1.4.1-5.el3.src",
"3AS:mutt-5:1.4.1-5.el3.x86_64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3AS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-5:1.4.1-5.el3.i386",
"3Desktop:mutt-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-5:1.4.1-5.el3.s390",
"3Desktop:mutt-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-5:1.4.1-5.el3.src",
"3Desktop:mutt-5:1.4.1-5.el3.x86_64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3Desktop:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3ES:mutt-5:1.4.1-5.el3.i386",
"3ES:mutt-5:1.4.1-5.el3.ia64",
"3ES:mutt-5:1.4.1-5.el3.ppc",
"3ES:mutt-5:1.4.1-5.el3.s390",
"3ES:mutt-5:1.4.1-5.el3.s390x",
"3ES:mutt-5:1.4.1-5.el3.src",
"3ES:mutt-5:1.4.1-5.el3.x86_64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3ES:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"3WS:mutt-5:1.4.1-5.el3.i386",
"3WS:mutt-5:1.4.1-5.el3.ia64",
"3WS:mutt-5:1.4.1-5.el3.ppc",
"3WS:mutt-5:1.4.1-5.el3.s390",
"3WS:mutt-5:1.4.1-5.el3.s390x",
"3WS:mutt-5:1.4.1-5.el3.src",
"3WS:mutt-5:1.4.1-5.el3.x86_64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.i386",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ia64",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.ppc",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.s390x",
"3WS:mutt-debuginfo-5:1.4.1-5.el3.x86_64",
"4AS:mutt-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-5:1.4.1-12.0.3.el4.src",
"4AS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4AS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.src",
"4Desktop:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4Desktop:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-5:1.4.1-12.0.3.el4.src",
"4ES:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4ES:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-5:1.4.1-12.0.3.el4.src",
"4WS:mutt-5:1.4.1-12.0.3.el4.x86_64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.i386",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ia64",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.ppc",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.s390x",
"4WS:mutt-debuginfo-5:1.4.1-12.0.3.el4.x86_64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Client:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Client:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.src",
"5Server:mutt-5:1.4.2.2-3.0.2.el5.x86_64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.i386",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ia64",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.ppc",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.s390x",
"5Server:mutt-debuginfo-5:1.4.2.2-3.0.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0386"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Buffer overflow in mutt\u0027s gecos structure handling"
}
]
}
RHSA-2009:1140
Vulnerability from csaf_redhat - Published: 2009-07-02 16:55 - Updated: 2025-11-21 17:34The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way the Ruby POP module processed certain APOP\nauthentication requests. By sending certain responses when the Ruby APOP\nmodule attempted to authenticate using APOP against a POP server, a remote\nattacker could, potentially, acquire certain portions of a user\u0027s\nauthentication credentials. (CVE-2007-1558)\n\nIt was discovered that Ruby did not properly check the return value when\nverifying X.509 certificates. This could, potentially, allow a remote\nattacker to present an invalid X.509 certificate, and have Ruby treat it as\nvalid. (CVE-2009-0642)\n\nA flaw was found in the way Ruby converted BigDecimal objects to Float\nnumbers. If an attacker were able to provide certain input for the\nBigDecimal object converter, they could crash an application using this\nclass. (CVE-2009-1904)\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1140",
"url": "https://access.redhat.com/errata/RHSA-2009:1140"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "486183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=486183"
},
{
"category": "external",
"summary": "504958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504958"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1140.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:50+00:00",
"generator": {
"date": "2025-11-21T17:34:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1140",
"initial_release_date": "2009-07-02T16:55:00+00:00",
"revision_history": [
{
"date": "2009-07-02T16:55:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-02T13:02:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.ia64",
"product_id": "irb-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"product_id": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_3.7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.i386",
"product_id": "irb-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_3.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_3.7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.src",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.src",
"product_id": "ruby-0:1.8.1-7.el4_8.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.src",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.src",
"product_id": "ruby-0:1.8.5-5.el5_3.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "irb-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_3.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.ppc",
"product_id": "irb-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"product_id": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_3.7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.s390x",
"product_id": "irb-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"product_id": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_3.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "irb-0:1.8.1-7.el4_8.3.s390",
"product_id": "irb-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"product_id": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_8.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"product_id": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_3.7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_3.7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"product_id": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_3.7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-02T16:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1140"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
},
{
"cve": "CVE-2009-0642",
"discovery_date": "2009-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "486183"
}
],
"notes": [
{
"category": "description",
"text": "ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Incorrect checks for validity of X.509 certificates",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0642"
},
{
"category": "external",
"summary": "RHBZ#486183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=486183"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0642"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0642",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0642"
}
],
"release_date": "2009-01-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-02T16:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1140"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Incorrect checks for validity of X.509 certificates"
},
{
"cve": "CVE-2009-1904",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504958"
}
],
"notes": [
{
"category": "description",
"text": "The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: DoS vulnerability in BigDecimal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1904"
},
{
"category": "external",
"summary": "RHBZ#504958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1904",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1904"
}
],
"release_date": "2009-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-02T16:55:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1140"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-7.el4_8.3.i386",
"4AS:irb-0:1.8.1-7.el4_8.3.ia64",
"4AS:irb-0:1.8.1-7.el4_8.3.ppc",
"4AS:irb-0:1.8.1-7.el4_8.3.s390",
"4AS:irb-0:1.8.1-7.el4_8.3.s390x",
"4AS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-0:1.8.1-7.el4_8.3.src",
"4AS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.i386",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:irb-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390",
"4Desktop:irb-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:irb-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.src",
"4Desktop:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4ES:irb-0:1.8.1-7.el4_8.3.i386",
"4ES:irb-0:1.8.1-7.el4_8.3.ia64",
"4ES:irb-0:1.8.1-7.el4_8.3.ppc",
"4ES:irb-0:1.8.1-7.el4_8.3.s390",
"4ES:irb-0:1.8.1-7.el4_8.3.s390x",
"4ES:irb-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-0:1.8.1-7.el4_8.3.src",
"4ES:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"4WS:irb-0:1.8.1-7.el4_8.3.i386",
"4WS:irb-0:1.8.1-7.el4_8.3.ia64",
"4WS:irb-0:1.8.1-7.el4_8.3.ppc",
"4WS:irb-0:1.8.1-7.el4_8.3.s390",
"4WS:irb-0:1.8.1-7.el4_8.3.s390x",
"4WS:irb-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-0:1.8.1-7.el4_8.3.src",
"4WS:ruby-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_8.3.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_8.3.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-0:1.8.5-5.el5_3.7.src",
"5Client:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-0:1.8.5-5.el5_3.7.src",
"5Server:ruby-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_3.7.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_3.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: DoS vulnerability in BigDecimal"
}
]
}
RHSA-2007:0401
Vulnerability from csaf_redhat - Published: 2007-05-31 01:50 - Updated: 2025-11-21 17:31Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane. NOTE: this issue can be leveraged for phishing and other attacks.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated thunderbird packages that fix several security bugs are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nSeveral flaws were found in the way Thunderbird processed certain malformed\nJavaScript code. A web page containing malicious JavaScript code could\ncause Thunderbird to crash or potentially execute arbitrary code\nas the user running Thunderbird. (CVE-2007-2867, CVE-2007-2868)\n\nSeveral denial of service flaws were found in the way Thunderbird handled\ncertain form and cookie data. A malicious web site that is able to set\narbitrary form and cookie data could prevent Thunderbird from\nfunctioning properly. (CVE-2007-1362, CVE-2007-2869)\n\nA flaw was found in the way Thunderbird processed certain APOP\nauthentication requests. By sending certain responses when Thunderbird\nattempted to authenticate against an APOP server, a remote attacker could\npotentially acquire certain portions of a user\u0027s authentication\ncredentials. (CVE-2007-1558)\n\nA flaw was found in the way Thunderbird displayed certain web content. A\nmalicious web page could generate content which could overlay user\ninterface elements such as the hostname and security indicators, tricking \nusers into thinking they are visiting a different site. (CVE-2007-2871)\n\nUsers of Thunderbird are advised to apply this update, which contains\nThunderbird version 1.5.0.12 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0401",
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
},
{
"category": "external",
"summary": "241671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241671"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0401.json"
}
],
"title": "Red Hat Security Advisory: thunderbird security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:45+00:00",
"generator": {
"date": "2025-11-21T17:31:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0401",
"initial_release_date": "2007-05-31T01:50:00+00:00",
"revision_history": [
{
"date": "2007-05-31T01:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-09T12:52:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_productivity:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-1.el5.x86_64",
"product": {
"name": "thunderbird-0:1.5.0.12-1.el5.x86_64",
"product_id": "thunderbird-0:1.5.0.12-1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-1.el5.i386",
"product": {
"name": "thunderbird-0:1.5.0.12-1.el5.i386",
"product_id": "thunderbird-0:1.5.0.12-1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.src",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.src",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-1.el5.src",
"product": {
"name": "thunderbird-0:1.5.0.12-1.el5.src",
"product_id": "thunderbird-0:1.5.0.12-1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"product": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"product_id": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird-debuginfo@1.5.0.12-0.1.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"product": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"product_id": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-0.1.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.src"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:1.5.0.12-1.el5.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:1.5.0.12-1.el5.src"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-0:1.5.0.12-1.el5.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.src",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-0:1.5.0.12-1.el5.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64"
},
"product_reference": "thunderbird-0:1.5.0.12-1.el5.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
},
"product_reference": "thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"relates_to_product_reference": "5Server-DPAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1362",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka \"Path Abuse in Cookies.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1362"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1362",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1362"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
},
{
"cve": "CVE-2007-2867",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2867"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2867"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-2868",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618369"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2868"
},
{
"category": "external",
"summary": "RHBZ#1618369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2868"
}
],
"release_date": "2007-05-31T00:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2007-2869",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2869"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2869"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-2871",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser\u0027s content pane. NOTE: this issue can be leveraged for phishing and other attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2871"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2871"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T01:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4AS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4AS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.src",
"4Desktop:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4Desktop:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.src",
"4ES:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4ES:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.src",
"4WS:thunderbird-0:1.5.0.12-0.1.el4.x86_64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.i386",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ia64",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.ppc",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.s390x",
"4WS:thunderbird-debuginfo-0:1.5.0.12-0.1.el4.x86_64",
"5Client:thunderbird-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-0:1.5.0.12-1.el5.src",
"5Client:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Client:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.src",
"5Server-DPAS:thunderbird-0:1.5.0.12-1.el5.x86_64",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.i386",
"5Server-DPAS:thunderbird-debuginfo-0:1.5.0.12-1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0401"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
}
]
}
RHSA-2007:0402
Vulnerability from csaf_redhat - Published: 2007-05-31 02:47 - Updated: 2025-11-21 17:31Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane. NOTE: this issue can be leveraged for phishing and other attacks.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated seamonkey packages that fix several security bugs are now available\nfor Red Hat Enterprise Linux 2.1, 3, and 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "SeaMonkey is an open source Web browser, advanced email and newsgroup\nclient, IRC chat client, and HTML editor.\n\nSeveral flaws were found in the way SeaMonkey processed certain malformed\nJavaScript code. A web page containing malicious JavaScript code could\ncause SeaMonkey to crash or potentially execute arbitrary code as\nthe user running SeaMonkey. (CVE-2007-2867, CVE-2007-2868)\n\nA flaw was found in the way SeaMonkey handled certain FTP PASV commands. A\nmalicious FTP server could use this flaw to perform a rudimentary port-scan\nof machines behind a user\u0027s firewall. (CVE-2007-1562)\n\nSeveral denial of service flaws were found in the way SeaMonkey handled\ncertain form and cookie data. A malicious web site that is able to set\narbitrary form and cookie data could prevent SeaMonkey from\nfunctioning properly. (CVE-2007-1362, CVE-2007-2869)\n\nA flaw was found in the way SeaMonkey processed certain APOP authentication\nrequests. By sending certain responses when SeaMonkey attempted to\nauthenticate against an APOP server, a remote attacker could potentially\nacquire certain portions of a user\u0027s authentication credentials.\n(CVE-2007-1558)\n\nA flaw was found in the way SeaMonkey handled the addEventListener\nJavaScript method. A malicious web site could use this method to access or\nmodify sensitive data from another web site. (CVE-2007-2870)\n\nA flaw was found in the way SeaMonkey displayed certain web content. A\nmalicious web page could generate content that would overlay user\ninterface elements such as the hostname and security indicators, tricking \nusers into thinking they are visiting a different site. (CVE-2007-2871) \n\nUsers of SeaMonkey are advised to upgrade to these erratum packages, which\ncontain SeaMonkey version 1.0.9 that corrects these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0402",
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "241672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241672"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0402.json"
}
],
"title": "Red Hat Security Advisory: seamonkey security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:45+00:00",
"generator": {
"date": "2025-11-21T17:31:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0402",
"initial_release_date": "2007-05-31T02:47:00+00:00",
"revision_history": [
{
"date": "2007-05-31T02:47:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-09T13:31:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el2.src",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el2.src",
"product_id": "seamonkey-0:1.0.9-0.1.el2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el2?arch=src"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.src",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.src",
"product_id": "seamonkey-0:1.0.9-0.1.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=src"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.src",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.src",
"product_id": "seamonkey-0:1.0.9-2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.8.el4.src",
"product": {
"name": "devhelp-0:0.10-0.8.el4.src",
"product_id": "devhelp-0:0.10-0.8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.8.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.i386",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.i386",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"product_id": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.8.el4.i386",
"product": {
"name": "devhelp-0:0.10-0.8.el4.i386",
"product_id": "devhelp-0:0.10-0.8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.8.el4.i386",
"product": {
"name": "devhelp-devel-0:0.10-0.8.el4.i386",
"product_id": "devhelp-devel-0:0.10-0.8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.8.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"product_id": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.8.el4.x86_64",
"product": {
"name": "devhelp-0:0.10-0.8.el4.x86_64",
"product_id": "devhelp-0:0.10-0.8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"product": {
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"product_id": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.8.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"product": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"product_id": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-debuginfo@0.10-0.8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-0:0.10-0.8.el4.ppc",
"product": {
"name": "devhelp-0:0.10-0.8.el4.ppc",
"product_id": "devhelp-0:0.10-0.8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp@0.10-0.8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "devhelp-devel-0:0.10-0.8.el4.ppc",
"product": {
"name": "devhelp-devel-0:0.10-0.8.el4.ppc",
"product_id": "devhelp-devel-0:0.10-0.8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/devhelp-devel@0.10-0.8.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"product": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"product_id": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.1.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-chat-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-chat-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-mail-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-mail-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "seamonkey-devel-0:1.0.9-2.el4.s390",
"product": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390",
"product_id": "seamonkey-devel-0:1.0.9-2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-2.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-0:1.0.9-0.1.el2.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-0:1.0.9-0.1.el2.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-0:1.0.9-0.1.el2.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-0:1.0.9-0.1.el2.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.src"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64"
},
"product_reference": "seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.8.el4.src"
},
"product_reference": "devhelp-0:0.10-0.8.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:devhelp-devel-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.8.el4.src"
},
"product_reference": "devhelp-0:0.10-0.8.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.8.el4.src"
},
"product_reference": "devhelp-0:0.10-0.8.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:devhelp-devel-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.8.el4.src"
},
"product_reference": "devhelp-0:0.10-0.8.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.8.el4.i386"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.8.el4.ppc"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "devhelp-devel-0:0.10-0.8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:devhelp-devel-0:0.10-0.8.el4.x86_64"
},
"product_reference": "devhelp-devel-0:0.10-0.8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.src"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-chat-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-chat-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-devel-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-devel-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.i386"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.ia64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.ppc"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.s390"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.s390x"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "seamonkey-mail-0:1.0.9-2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
},
"product_reference": "seamonkey-mail-0:1.0.9-2.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1362",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka \"Path Abuse in Cookies.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1362"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1362",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1362"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
},
{
"cve": "CVE-2007-1562",
"discovery_date": "2007-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618368"
}
],
"notes": [
{
"category": "description",
"text": "The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1562"
},
{
"category": "external",
"summary": "RHBZ#1618368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1562",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1562"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1562",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1562"
}
],
"release_date": "2007-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2007-2867",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2867"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2867"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-2868",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618369"
}
],
"notes": [
{
"category": "description",
"text": "Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2868"
},
{
"category": "external",
"summary": "RHBZ#1618369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2868"
}
],
"release_date": "2007-05-31T00:10:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2007-2869",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2869"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2869"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
},
{
"cve": "CVE-2007-2870",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618370"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2870"
},
{
"category": "external",
"summary": "RHBZ#1618370",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618370"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2870"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2870",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2870"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "security flaw"
},
{
"cve": "CVE-2007-2871",
"discovery_date": "2007-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241840"
}
],
"notes": [
{
"category": "description",
"text": "Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser\u0027s content pane. NOTE: this issue can be leveraged for phishing and other attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2871"
},
{
"category": "external",
"summary": "RHBZ#241840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2871"
}
],
"release_date": "2007-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-31T02:47:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-0:1.0.9-0.1.el2.src",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1AW:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-0:1.0.9-0.1.el2.src",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1ES:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-0:1.0.9-0.1.el2.src",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-chat-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-dom-inspector-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-js-debugger-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-mail-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nspr-devel-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-0:1.0.9-0.1.el2.ia64",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.i386",
"2.1WS:seamonkey-nss-devel-0:1.0.9-0.1.el2.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-0:1.0.9-0.1.el3.src",
"3AS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3AS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.src",
"3Desktop:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3Desktop:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-0:1.0.9-0.1.el3.src",
"3ES:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3ES:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-0:1.0.9-0.1.el3.src",
"3WS:seamonkey-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-chat-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-debuginfo-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-dom-inspector-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-js-debugger-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-mail-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nspr-devel-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-0:1.0.9-0.1.el3.x86_64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.i386",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ia64",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.ppc",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.s390x",
"3WS:seamonkey-nss-devel-0:1.0.9-0.1.el3.x86_64",
"4AS:devhelp-0:0.10-0.8.el4.i386",
"4AS:devhelp-0:0.10-0.8.el4.ppc",
"4AS:devhelp-0:0.10-0.8.el4.src",
"4AS:devhelp-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4AS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4AS:devhelp-devel-0:0.10-0.8.el4.i386",
"4AS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4AS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4AS:seamonkey-0:1.0.9-2.el4.i386",
"4AS:seamonkey-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-0:1.0.9-2.el4.s390",
"4AS:seamonkey-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-0:1.0.9-2.el4.src",
"4AS:seamonkey-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4AS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4AS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4AS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4AS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4AS:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4Desktop:devhelp-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-0:0.10-0.8.el4.src",
"4Desktop:devhelp-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.i386",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.ppc",
"4Desktop:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4Desktop:seamonkey-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-0:1.0.9-2.el4.src",
"4Desktop:seamonkey-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.i386",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4Desktop:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4ES:devhelp-0:0.10-0.8.el4.i386",
"4ES:devhelp-0:0.10-0.8.el4.ppc",
"4ES:devhelp-0:0.10-0.8.el4.src",
"4ES:devhelp-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4ES:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4ES:devhelp-devel-0:0.10-0.8.el4.i386",
"4ES:devhelp-devel-0:0.10-0.8.el4.ppc",
"4ES:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4ES:seamonkey-0:1.0.9-2.el4.i386",
"4ES:seamonkey-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-0:1.0.9-2.el4.s390",
"4ES:seamonkey-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-0:1.0.9-2.el4.src",
"4ES:seamonkey-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.i386",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390",
"4ES:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.i386",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390",
"4ES:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.i386",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4ES:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390",
"4ES:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4ES:seamonkey-mail-0:1.0.9-2.el4.x86_64",
"4WS:devhelp-0:0.10-0.8.el4.i386",
"4WS:devhelp-0:0.10-0.8.el4.ppc",
"4WS:devhelp-0:0.10-0.8.el4.src",
"4WS:devhelp-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.i386",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.ppc",
"4WS:devhelp-debuginfo-0:0.10-0.8.el4.x86_64",
"4WS:devhelp-devel-0:0.10-0.8.el4.i386",
"4WS:devhelp-devel-0:0.10-0.8.el4.ppc",
"4WS:devhelp-devel-0:0.10-0.8.el4.x86_64",
"4WS:seamonkey-0:1.0.9-2.el4.i386",
"4WS:seamonkey-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-0:1.0.9-2.el4.s390",
"4WS:seamonkey-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-0:1.0.9-2.el4.src",
"4WS:seamonkey-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.i386",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-chat-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390",
"4WS:seamonkey-chat-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-chat-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.i386",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-debuginfo-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.i386",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-devel-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390",
"4WS:seamonkey-devel-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-devel-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.i386",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-dom-inspector-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.i386",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-js-debugger-0:1.0.9-2.el4.x86_64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.i386",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ia64",
"4WS:seamonkey-mail-0:1.0.9-2.el4.ppc",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390",
"4WS:seamonkey-mail-0:1.0.9-2.el4.s390x",
"4WS:seamonkey-mail-0:1.0.9-2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0402"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)"
}
]
}
RHSA-2007:0353
Vulnerability from csaf_redhat - Published: 2007-05-17 14:45 - Updated: 2025-11-21 17:31The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated evolution packages that fix a security bug are now available for\nRed Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Evolution is the GNOME collection of personal information management (PIM)\ntools.\n\nA flaw was found in the way Evolution processed certain APOP authentication\nrequests. A remote attacker could potentially acquire certain portions of a\nuser\u0027s authentication credentials by sending certain responses when\nevolution-data-server attempted to authenticate against an APOP server.\n(CVE-2007-1558)\n\nAll users of Evolution should upgrade to these updated packages, which\ncontain a backported patch which resolves this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0353",
"url": "https://access.redhat.com/errata/RHSA-2007:0353"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "238565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=238565"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0353.json"
}
],
"title": "Red Hat Security Advisory: evolution security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:39+00:00",
"generator": {
"date": "2025-11-21T17:31:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0353",
"initial_release_date": "2007-05-17T14:45:00+00:00",
"revision_history": [
{
"date": "2007-05-17T14:45:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:11:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.ia64",
"product": {
"name": "evolution-0:1.4.5-20.el3.ia64",
"product_id": "evolution-0:1.4.5-20.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.ia64",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.ia64",
"product_id": "evolution-devel-0:1.4.5-20.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.ia64",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.ia64",
"product_id": "evolution-0:2.0.2-35.0.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.src",
"product": {
"name": "evolution-0:1.4.5-20.el3.src",
"product_id": "evolution-0:1.4.5-20.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=src"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.src",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.src",
"product_id": "evolution-0:2.0.2-35.0.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.x86_64",
"product": {
"name": "evolution-0:1.4.5-20.el3.x86_64",
"product_id": "evolution-0:1.4.5-20.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.x86_64",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.x86_64",
"product_id": "evolution-devel-0:1.4.5-20.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"product_id": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.i386",
"product": {
"name": "evolution-0:1.4.5-20.el3.i386",
"product_id": "evolution-0:1.4.5-20.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.i386",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.i386",
"product_id": "evolution-devel-0:1.4.5-20.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.i386",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.i386",
"product_id": "evolution-0:2.0.2-35.0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.ppc",
"product": {
"name": "evolution-0:1.4.5-20.el3.ppc",
"product_id": "evolution-0:1.4.5-20.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.ppc",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.ppc",
"product_id": "evolution-devel-0:1.4.5-20.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.ppc",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.ppc",
"product_id": "evolution-0:2.0.2-35.0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.s390x",
"product": {
"name": "evolution-0:1.4.5-20.el3.s390x",
"product_id": "evolution-0:1.4.5-20.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.s390x",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.s390x",
"product_id": "evolution-devel-0:1.4.5-20.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.s390x",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390x",
"product_id": "evolution-0:2.0.2-35.0.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-0:1.4.5-20.el3.s390",
"product": {
"name": "evolution-0:1.4.5-20.el3.s390",
"product_id": "evolution-0:1.4.5-20.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@1.4.5-20.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:1.4.5-20.el3.s390",
"product": {
"name": "evolution-devel-0:1.4.5-20.el3.s390",
"product_id": "evolution-devel-0:1.4.5-20.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@1.4.5-20.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"product": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"product_id": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@1.4.5-20.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-0:2.0.2-35.0.2.el4.s390",
"product": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390",
"product_id": "evolution-0:2.0.2-35.0.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution@2.0.2-35.0.2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"product": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"product_id": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-debuginfo@2.0.2-35.0.2.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"product": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"product_id": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-devel@2.0.2-35.0.2.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.src"
},
"product_reference": "evolution-0:1.4.5-20.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-debuginfo-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:evolution-devel-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.src"
},
"product_reference": "evolution-0:1.4.5-20.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-debuginfo-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:evolution-devel-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.src"
},
"product_reference": "evolution-0:1.4.5-20.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-debuginfo-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:evolution-devel-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.src"
},
"product_reference": "evolution-0:1.4.5-20.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-debuginfo-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.i386"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.ia64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.ppc"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.s390"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.s390x"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:1.4.5-20.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:evolution-devel-0:1.4.5-20.el3.x86_64"
},
"product_reference": "evolution-devel-0:1.4.5-20.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.src"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.src"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.src"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.src"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.i386"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.ia64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.ppc"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390x"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
},
"product_reference": "evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:evolution-0:1.4.5-20.el3.i386",
"3AS:evolution-0:1.4.5-20.el3.ia64",
"3AS:evolution-0:1.4.5-20.el3.ppc",
"3AS:evolution-0:1.4.5-20.el3.s390",
"3AS:evolution-0:1.4.5-20.el3.s390x",
"3AS:evolution-0:1.4.5-20.el3.src",
"3AS:evolution-0:1.4.5-20.el3.x86_64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3AS:evolution-devel-0:1.4.5-20.el3.i386",
"3AS:evolution-devel-0:1.4.5-20.el3.ia64",
"3AS:evolution-devel-0:1.4.5-20.el3.ppc",
"3AS:evolution-devel-0:1.4.5-20.el3.s390",
"3AS:evolution-devel-0:1.4.5-20.el3.s390x",
"3AS:evolution-devel-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-0:1.4.5-20.el3.i386",
"3Desktop:evolution-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-0:1.4.5-20.el3.s390",
"3Desktop:evolution-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-0:1.4.5-20.el3.src",
"3Desktop:evolution-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.i386",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-devel-0:1.4.5-20.el3.x86_64",
"3ES:evolution-0:1.4.5-20.el3.i386",
"3ES:evolution-0:1.4.5-20.el3.ia64",
"3ES:evolution-0:1.4.5-20.el3.ppc",
"3ES:evolution-0:1.4.5-20.el3.s390",
"3ES:evolution-0:1.4.5-20.el3.s390x",
"3ES:evolution-0:1.4.5-20.el3.src",
"3ES:evolution-0:1.4.5-20.el3.x86_64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3ES:evolution-devel-0:1.4.5-20.el3.i386",
"3ES:evolution-devel-0:1.4.5-20.el3.ia64",
"3ES:evolution-devel-0:1.4.5-20.el3.ppc",
"3ES:evolution-devel-0:1.4.5-20.el3.s390",
"3ES:evolution-devel-0:1.4.5-20.el3.s390x",
"3ES:evolution-devel-0:1.4.5-20.el3.x86_64",
"3WS:evolution-0:1.4.5-20.el3.i386",
"3WS:evolution-0:1.4.5-20.el3.ia64",
"3WS:evolution-0:1.4.5-20.el3.ppc",
"3WS:evolution-0:1.4.5-20.el3.s390",
"3WS:evolution-0:1.4.5-20.el3.s390x",
"3WS:evolution-0:1.4.5-20.el3.src",
"3WS:evolution-0:1.4.5-20.el3.x86_64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3WS:evolution-devel-0:1.4.5-20.el3.i386",
"3WS:evolution-devel-0:1.4.5-20.el3.ia64",
"3WS:evolution-devel-0:1.4.5-20.el3.ppc",
"3WS:evolution-devel-0:1.4.5-20.el3.s390",
"3WS:evolution-devel-0:1.4.5-20.el3.s390x",
"3WS:evolution-devel-0:1.4.5-20.el3.x86_64",
"4AS:evolution-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-0:2.0.2-35.0.2.el4.src",
"4AS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.src",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-0:2.0.2-35.0.2.el4.src",
"4ES:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-0:2.0.2-35.0.2.el4.src",
"4WS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-17T14:45:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:evolution-0:1.4.5-20.el3.i386",
"3AS:evolution-0:1.4.5-20.el3.ia64",
"3AS:evolution-0:1.4.5-20.el3.ppc",
"3AS:evolution-0:1.4.5-20.el3.s390",
"3AS:evolution-0:1.4.5-20.el3.s390x",
"3AS:evolution-0:1.4.5-20.el3.src",
"3AS:evolution-0:1.4.5-20.el3.x86_64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3AS:evolution-devel-0:1.4.5-20.el3.i386",
"3AS:evolution-devel-0:1.4.5-20.el3.ia64",
"3AS:evolution-devel-0:1.4.5-20.el3.ppc",
"3AS:evolution-devel-0:1.4.5-20.el3.s390",
"3AS:evolution-devel-0:1.4.5-20.el3.s390x",
"3AS:evolution-devel-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-0:1.4.5-20.el3.i386",
"3Desktop:evolution-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-0:1.4.5-20.el3.s390",
"3Desktop:evolution-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-0:1.4.5-20.el3.src",
"3Desktop:evolution-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.i386",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-devel-0:1.4.5-20.el3.x86_64",
"3ES:evolution-0:1.4.5-20.el3.i386",
"3ES:evolution-0:1.4.5-20.el3.ia64",
"3ES:evolution-0:1.4.5-20.el3.ppc",
"3ES:evolution-0:1.4.5-20.el3.s390",
"3ES:evolution-0:1.4.5-20.el3.s390x",
"3ES:evolution-0:1.4.5-20.el3.src",
"3ES:evolution-0:1.4.5-20.el3.x86_64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3ES:evolution-devel-0:1.4.5-20.el3.i386",
"3ES:evolution-devel-0:1.4.5-20.el3.ia64",
"3ES:evolution-devel-0:1.4.5-20.el3.ppc",
"3ES:evolution-devel-0:1.4.5-20.el3.s390",
"3ES:evolution-devel-0:1.4.5-20.el3.s390x",
"3ES:evolution-devel-0:1.4.5-20.el3.x86_64",
"3WS:evolution-0:1.4.5-20.el3.i386",
"3WS:evolution-0:1.4.5-20.el3.ia64",
"3WS:evolution-0:1.4.5-20.el3.ppc",
"3WS:evolution-0:1.4.5-20.el3.s390",
"3WS:evolution-0:1.4.5-20.el3.s390x",
"3WS:evolution-0:1.4.5-20.el3.src",
"3WS:evolution-0:1.4.5-20.el3.x86_64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3WS:evolution-devel-0:1.4.5-20.el3.i386",
"3WS:evolution-devel-0:1.4.5-20.el3.ia64",
"3WS:evolution-devel-0:1.4.5-20.el3.ppc",
"3WS:evolution-devel-0:1.4.5-20.el3.s390",
"3WS:evolution-devel-0:1.4.5-20.el3.s390x",
"3WS:evolution-devel-0:1.4.5-20.el3.x86_64",
"4AS:evolution-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-0:2.0.2-35.0.2.el4.src",
"4AS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.src",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-0:2.0.2-35.0.2.el4.src",
"4ES:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-0:2.0.2-35.0.2.el4.src",
"4WS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0353"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"3AS:evolution-0:1.4.5-20.el3.i386",
"3AS:evolution-0:1.4.5-20.el3.ia64",
"3AS:evolution-0:1.4.5-20.el3.ppc",
"3AS:evolution-0:1.4.5-20.el3.s390",
"3AS:evolution-0:1.4.5-20.el3.s390x",
"3AS:evolution-0:1.4.5-20.el3.src",
"3AS:evolution-0:1.4.5-20.el3.x86_64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3AS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3AS:evolution-devel-0:1.4.5-20.el3.i386",
"3AS:evolution-devel-0:1.4.5-20.el3.ia64",
"3AS:evolution-devel-0:1.4.5-20.el3.ppc",
"3AS:evolution-devel-0:1.4.5-20.el3.s390",
"3AS:evolution-devel-0:1.4.5-20.el3.s390x",
"3AS:evolution-devel-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-0:1.4.5-20.el3.i386",
"3Desktop:evolution-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-0:1.4.5-20.el3.s390",
"3Desktop:evolution-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-0:1.4.5-20.el3.src",
"3Desktop:evolution-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.i386",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ia64",
"3Desktop:evolution-devel-0:1.4.5-20.el3.ppc",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390",
"3Desktop:evolution-devel-0:1.4.5-20.el3.s390x",
"3Desktop:evolution-devel-0:1.4.5-20.el3.x86_64",
"3ES:evolution-0:1.4.5-20.el3.i386",
"3ES:evolution-0:1.4.5-20.el3.ia64",
"3ES:evolution-0:1.4.5-20.el3.ppc",
"3ES:evolution-0:1.4.5-20.el3.s390",
"3ES:evolution-0:1.4.5-20.el3.s390x",
"3ES:evolution-0:1.4.5-20.el3.src",
"3ES:evolution-0:1.4.5-20.el3.x86_64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3ES:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3ES:evolution-devel-0:1.4.5-20.el3.i386",
"3ES:evolution-devel-0:1.4.5-20.el3.ia64",
"3ES:evolution-devel-0:1.4.5-20.el3.ppc",
"3ES:evolution-devel-0:1.4.5-20.el3.s390",
"3ES:evolution-devel-0:1.4.5-20.el3.s390x",
"3ES:evolution-devel-0:1.4.5-20.el3.x86_64",
"3WS:evolution-0:1.4.5-20.el3.i386",
"3WS:evolution-0:1.4.5-20.el3.ia64",
"3WS:evolution-0:1.4.5-20.el3.ppc",
"3WS:evolution-0:1.4.5-20.el3.s390",
"3WS:evolution-0:1.4.5-20.el3.s390x",
"3WS:evolution-0:1.4.5-20.el3.src",
"3WS:evolution-0:1.4.5-20.el3.x86_64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.i386",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ia64",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.ppc",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.s390x",
"3WS:evolution-debuginfo-0:1.4.5-20.el3.x86_64",
"3WS:evolution-devel-0:1.4.5-20.el3.i386",
"3WS:evolution-devel-0:1.4.5-20.el3.ia64",
"3WS:evolution-devel-0:1.4.5-20.el3.ppc",
"3WS:evolution-devel-0:1.4.5-20.el3.s390",
"3WS:evolution-devel-0:1.4.5-20.el3.s390x",
"3WS:evolution-devel-0:1.4.5-20.el3.x86_64",
"4AS:evolution-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-0:2.0.2-35.0.2.el4.src",
"4AS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4AS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.src",
"4Desktop:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4Desktop:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-0:2.0.2-35.0.2.el4.src",
"4ES:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4ES:evolution-devel-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-0:2.0.2-35.0.2.el4.src",
"4WS:evolution-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-debuginfo-0:2.0.2-35.0.2.el4.x86_64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.i386",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ia64",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.ppc",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.s390x",
"4WS:evolution-devel-0:2.0.2-35.0.2.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
}
]
}
RHSA-2007:0344
Vulnerability from csaf_redhat - Published: 2007-05-30 09:12 - Updated: 2025-11-21 17:31The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated evolution-data-server package that fixes a security bug are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The evolution-data-server package provides a unified backend for programs\nthat work with contacts, tasks, and calendar information.\n\nA flaw was found in the way evolution-data-server processed certain APOP\nauthentication requests. By sending certain responses when\nevolution-data-server attempted to authenticate against an APOP server, a\nremote attacker could potentially acquire certain portions of a user\u0027s\nauthentication credentials. (CVE-2007-1558)\n\nAll users of evolution-data-server should upgrade to these updated\npackages, which contain a backported patch which resolves this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0344",
"url": "https://access.redhat.com/errata/RHSA-2007:0344"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "235289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=235289"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0344.json"
}
],
"title": "Red Hat Security Advisory: evolution-data-server security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:35+00:00",
"generator": {
"date": "2025-11-21T17:31:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0344",
"initial_release_date": "2007-05-30T09:12:00+00:00",
"revision_history": [
{
"date": "2007-05-30T09:12:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-05-30T05:12:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"product": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"product_id": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server@1.8.0-15.0.3.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"product": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"product_id": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-debuginfo@1.8.0-15.0.3.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"product": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"product_id": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/evolution-data-server-devel@1.8.0-15.0.3.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.src"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.src"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.src"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
},
"product_reference": "evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"discovery_date": "2007-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "241191"
}
],
"notes": [
{
"category": "description",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "RHBZ#241191",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241191"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
}
],
"release_date": "2007-04-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-05-30T09:12:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0344"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client-Workstation:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client-Workstation:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Client:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Client:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.src",
"5Server:evolution-data-server-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-debuginfo-0:1.8.0-15.0.3.el5.x86_64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.i386",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ia64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.ppc64",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.s390x",
"5Server:evolution-data-server-devel-0:1.8.0-15.0.3.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "fetchmail/mutt/evolution/...: APOP password disclosure vulnerability"
}
]
}
OPENSUSE-SU-2024:11615-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "mpop-1.4.14-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the mpop-1.4.14-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11615",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11615-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1558 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1558/"
}
],
"title": "mpop-1.4.14-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11615-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "mpop-1.4.14-1.1.aarch64",
"product": {
"name": "mpop-1.4.14-1.1.aarch64",
"product_id": "mpop-1.4.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "mpop-doc-1.4.14-1.1.aarch64",
"product": {
"name": "mpop-doc-1.4.14-1.1.aarch64",
"product_id": "mpop-doc-1.4.14-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mpop-1.4.14-1.1.ppc64le",
"product": {
"name": "mpop-1.4.14-1.1.ppc64le",
"product_id": "mpop-1.4.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "mpop-doc-1.4.14-1.1.ppc64le",
"product": {
"name": "mpop-doc-1.4.14-1.1.ppc64le",
"product_id": "mpop-doc-1.4.14-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mpop-1.4.14-1.1.s390x",
"product": {
"name": "mpop-1.4.14-1.1.s390x",
"product_id": "mpop-1.4.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "mpop-doc-1.4.14-1.1.s390x",
"product": {
"name": "mpop-doc-1.4.14-1.1.s390x",
"product_id": "mpop-doc-1.4.14-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mpop-1.4.14-1.1.x86_64",
"product": {
"name": "mpop-1.4.14-1.1.x86_64",
"product_id": "mpop-1.4.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "mpop-doc-1.4.14-1.1.x86_64",
"product": {
"name": "mpop-doc-1.4.14-1.1.x86_64",
"product_id": "mpop-doc-1.4.14-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-1.4.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-1.4.14-1.1.aarch64"
},
"product_reference": "mpop-1.4.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-1.4.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-1.4.14-1.1.ppc64le"
},
"product_reference": "mpop-1.4.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-1.4.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-1.4.14-1.1.s390x"
},
"product_reference": "mpop-1.4.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-1.4.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-1.4.14-1.1.x86_64"
},
"product_reference": "mpop-1.4.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-doc-1.4.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.aarch64"
},
"product_reference": "mpop-doc-1.4.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-doc-1.4.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.ppc64le"
},
"product_reference": "mpop-doc-1.4.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-doc-1.4.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.s390x"
},
"product_reference": "mpop-doc-1.4.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mpop-doc-1.4.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.x86_64"
},
"product_reference": "mpop-doc-1.4.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1558"
}
],
"notes": [
{
"category": "general",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mpop-1.4.14-1.1.aarch64",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.ppc64le",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.s390x",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.x86_64",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.aarch64",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.ppc64le",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.s390x",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1558",
"url": "https://www.suse.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "SUSE Bug 262450 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/262450"
},
{
"category": "external",
"summary": "SUSE Bug 271197 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/271197"
},
{
"category": "external",
"summary": "SUSE Bug 279843 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/279843"
},
{
"category": "external",
"summary": "SUSE Bug 281321 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281321"
},
{
"category": "external",
"summary": "SUSE Bug 281323 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mpop-1.4.14-1.1.aarch64",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.ppc64le",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.s390x",
"openSUSE Tumbleweed:mpop-1.4.14-1.1.x86_64",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.aarch64",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.ppc64le",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.s390x",
"openSUSE Tumbleweed:mpop-doc-1.4.14-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-1558"
}
]
}
OPENSUSE-SU-2024:10753-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fetchmail-6.4.21-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fetchmail-6.4.21-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10753",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10753-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-0321 page",
"url": "https://www.suse.com/security/cve/CVE-2006-0321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-5867 page",
"url": "https://www.suse.com/security/cve/CVE-2006-5867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-5974 page",
"url": "https://www.suse.com/security/cve/CVE-2006-5974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1558 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-4565 page",
"url": "https://www.suse.com/security/cve/CVE-2007-4565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36386 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36386/"
}
],
"title": "fetchmail-6.4.21-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10753-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.21-2.1.aarch64",
"product": {
"name": "fetchmail-6.4.21-2.1.aarch64",
"product_id": "fetchmail-6.4.21-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.21-2.1.aarch64",
"product": {
"name": "fetchmailconf-6.4.21-2.1.aarch64",
"product_id": "fetchmailconf-6.4.21-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.21-2.1.ppc64le",
"product": {
"name": "fetchmail-6.4.21-2.1.ppc64le",
"product_id": "fetchmail-6.4.21-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.21-2.1.ppc64le",
"product": {
"name": "fetchmailconf-6.4.21-2.1.ppc64le",
"product_id": "fetchmailconf-6.4.21-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.21-2.1.s390x",
"product": {
"name": "fetchmail-6.4.21-2.1.s390x",
"product_id": "fetchmail-6.4.21-2.1.s390x"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.21-2.1.s390x",
"product": {
"name": "fetchmailconf-6.4.21-2.1.s390x",
"product_id": "fetchmailconf-6.4.21-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fetchmail-6.4.21-2.1.x86_64",
"product": {
"name": "fetchmail-6.4.21-2.1.x86_64",
"product_id": "fetchmail-6.4.21-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "fetchmailconf-6.4.21-2.1.x86_64",
"product": {
"name": "fetchmailconf-6.4.21-2.1.x86_64",
"product_id": "fetchmailconf-6.4.21-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.21-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64"
},
"product_reference": "fetchmail-6.4.21-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.21-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le"
},
"product_reference": "fetchmail-6.4.21-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.21-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x"
},
"product_reference": "fetchmail-6.4.21-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmail-6.4.21-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64"
},
"product_reference": "fetchmail-6.4.21-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.21-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64"
},
"product_reference": "fetchmailconf-6.4.21-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.21-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le"
},
"product_reference": "fetchmailconf-6.4.21-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.21-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x"
},
"product_reference": "fetchmailconf-6.4.21-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fetchmailconf-6.4.21-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
},
"product_reference": "fetchmailconf-6.4.21-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-0321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-0321"
}
],
"notes": [
{
"category": "general",
"text": "fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-0321",
"url": "https://www.suse.com/security/cve/CVE-2006-0321"
},
{
"category": "external",
"summary": "SUSE Bug 140475 for CVE-2006-0321",
"url": "https://bugzilla.suse.com/140475"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-0321"
},
{
"cve": "CVE-2006-5867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-5867"
}
],
"notes": [
{
"category": "general",
"text": "fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-5867",
"url": "https://www.suse.com/security/cve/CVE-2006-5867"
},
{
"category": "external",
"summary": "SUSE Bug 223507 for CVE-2006-5867",
"url": "https://bugzilla.suse.com/223507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-5867"
},
{
"cve": "CVE-2006-5974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-5974"
}
],
"notes": [
{
"category": "general",
"text": "fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-5974",
"url": "https://www.suse.com/security/cve/CVE-2006-5974"
},
{
"category": "external",
"summary": "SUSE Bug 223507 for CVE-2006-5974",
"url": "https://bugzilla.suse.com/223507"
},
{
"category": "external",
"summary": "SUSE Bug 239002 for CVE-2006-5974",
"url": "https://bugzilla.suse.com/239002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2006-5974"
},
{
"cve": "CVE-2007-1558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1558"
}
],
"notes": [
{
"category": "general",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1558",
"url": "https://www.suse.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "SUSE Bug 262450 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/262450"
},
{
"category": "external",
"summary": "SUSE Bug 271197 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/271197"
},
{
"category": "external",
"summary": "SUSE Bug 279843 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/279843"
},
{
"category": "external",
"summary": "SUSE Bug 281321 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281321"
},
{
"category": "external",
"summary": "SUSE Bug 281323 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-1558"
},
{
"cve": "CVE-2007-4565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-4565"
}
],
"notes": [
{
"category": "general",
"text": "sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-4565",
"url": "https://www.suse.com/security/cve/CVE-2007-4565"
},
{
"category": "external",
"summary": "SUSE Bug 308271 for CVE-2007-4565",
"url": "https://bugzilla.suse.com/308271"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-4565"
},
{
"cve": "CVE-2021-36386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36386"
}
],
"notes": [
{
"category": "general",
"text": "report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36386",
"url": "https://www.suse.com/security/cve/CVE-2021-36386"
},
{
"category": "external",
"summary": "SUSE Bug 1188875 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1188875"
},
{
"category": "external",
"summary": "SUSE Bug 1224188 for CVE-2021-36386",
"url": "https://bugzilla.suse.com/1224188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmail-6.4.21-2.1.x86_64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.aarch64",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.ppc64le",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.s390x",
"openSUSE Tumbleweed:fetchmailconf-6.4.21-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-36386"
}
]
}
OPENSUSE-SU-2024:11069-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "mutt-2.0.7-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the mutt-2.0.7-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11069",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11069-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1558 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14349 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14350 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14351 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14352 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14353 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14354 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14355 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14356 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14357 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14358 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14359 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14360 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14360/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14361 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14362 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-14363 page",
"url": "https://www.suse.com/security/cve/CVE-2018-14363/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14093 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14954 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28896 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3181 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32055 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32055/"
}
],
"title": "mutt-2.0.7-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11069-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "mutt-2.0.7-2.2.aarch64",
"product": {
"name": "mutt-2.0.7-2.2.aarch64",
"product_id": "mutt-2.0.7-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "mutt-doc-2.0.7-2.2.aarch64",
"product": {
"name": "mutt-doc-2.0.7-2.2.aarch64",
"product_id": "mutt-doc-2.0.7-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "mutt-lang-2.0.7-2.2.aarch64",
"product": {
"name": "mutt-lang-2.0.7-2.2.aarch64",
"product_id": "mutt-lang-2.0.7-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-2.0.7-2.2.ppc64le",
"product": {
"name": "mutt-2.0.7-2.2.ppc64le",
"product_id": "mutt-2.0.7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mutt-doc-2.0.7-2.2.ppc64le",
"product": {
"name": "mutt-doc-2.0.7-2.2.ppc64le",
"product_id": "mutt-doc-2.0.7-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mutt-lang-2.0.7-2.2.ppc64le",
"product": {
"name": "mutt-lang-2.0.7-2.2.ppc64le",
"product_id": "mutt-lang-2.0.7-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-2.0.7-2.2.s390x",
"product": {
"name": "mutt-2.0.7-2.2.s390x",
"product_id": "mutt-2.0.7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "mutt-doc-2.0.7-2.2.s390x",
"product": {
"name": "mutt-doc-2.0.7-2.2.s390x",
"product_id": "mutt-doc-2.0.7-2.2.s390x"
}
},
{
"category": "product_version",
"name": "mutt-lang-2.0.7-2.2.s390x",
"product": {
"name": "mutt-lang-2.0.7-2.2.s390x",
"product_id": "mutt-lang-2.0.7-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mutt-2.0.7-2.2.x86_64",
"product": {
"name": "mutt-2.0.7-2.2.x86_64",
"product_id": "mutt-2.0.7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "mutt-doc-2.0.7-2.2.x86_64",
"product": {
"name": "mutt-doc-2.0.7-2.2.x86_64",
"product_id": "mutt-doc-2.0.7-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "mutt-lang-2.0.7-2.2.x86_64",
"product": {
"name": "mutt-lang-2.0.7-2.2.x86_64",
"product_id": "mutt-lang-2.0.7-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64"
},
"product_reference": "mutt-2.0.7-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le"
},
"product_reference": "mutt-2.0.7-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x"
},
"product_reference": "mutt-2.0.7-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64"
},
"product_reference": "mutt-2.0.7-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-doc-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64"
},
"product_reference": "mutt-doc-2.0.7-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-doc-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le"
},
"product_reference": "mutt-doc-2.0.7-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-doc-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x"
},
"product_reference": "mutt-doc-2.0.7-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-doc-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64"
},
"product_reference": "mutt-doc-2.0.7-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-lang-2.0.7-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64"
},
"product_reference": "mutt-lang-2.0.7-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-lang-2.0.7-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le"
},
"product_reference": "mutt-lang-2.0.7-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-lang-2.0.7-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x"
},
"product_reference": "mutt-lang-2.0.7-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mutt-lang-2.0.7-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
},
"product_reference": "mutt-lang-2.0.7-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1558"
}
],
"notes": [
{
"category": "general",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1558",
"url": "https://www.suse.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "SUSE Bug 262450 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/262450"
},
{
"category": "external",
"summary": "SUSE Bug 271197 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/271197"
},
{
"category": "external",
"summary": "SUSE Bug 279843 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/279843"
},
{
"category": "external",
"summary": "SUSE Bug 281321 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281321"
},
{
"category": "external",
"summary": "SUSE Bug 281323 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-1558"
},
{
"cve": "CVE-2018-14349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14349"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14349",
"url": "https://www.suse.com/security/cve/CVE-2018-14349"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14349",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14349",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14349",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14349"
},
{
"cve": "CVE-2018-14350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14350"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14350",
"url": "https://www.suse.com/security/cve/CVE-2018-14350"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14350",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101588 for CVE-2018-14350",
"url": "https://bugzilla.suse.com/1101588"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14350",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14350"
},
{
"cve": "CVE-2018-14351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14351"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14351",
"url": "https://www.suse.com/security/cve/CVE-2018-14351"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14351",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101583 for CVE-2018-14351",
"url": "https://bugzilla.suse.com/1101583"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14351",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-14351"
},
{
"cve": "CVE-2018-14352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14352"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14352",
"url": "https://www.suse.com/security/cve/CVE-2018-14352"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14352",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101582 for CVE-2018-14352",
"url": "https://bugzilla.suse.com/1101582"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14352",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14352"
},
{
"cve": "CVE-2018-14353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14353"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c has an integer underflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14353",
"url": "https://www.suse.com/security/cve/CVE-2018-14353"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14353",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101581 for CVE-2018-14353",
"url": "https://bugzilla.suse.com/1101581"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14353",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14353"
},
{
"cve": "CVE-2018-14354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14354"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14354",
"url": "https://www.suse.com/security/cve/CVE-2018-14354"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14354",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101578 for CVE-2018-14354",
"url": "https://bugzilla.suse.com/1101578"
},
{
"category": "external",
"summary": "SUSE Bug 1101581 for CVE-2018-14354",
"url": "https://bugzilla.suse.com/1101581"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14354",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14354",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-14354"
},
{
"cve": "CVE-2018-14355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14355"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles \"..\" directory traversal in a mailbox name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14355",
"url": "https://www.suse.com/security/cve/CVE-2018-14355"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14355",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101577 for CVE-2018-14355",
"url": "https://bugzilla.suse.com/1101577"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14355",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14355"
},
{
"cve": "CVE-2018-14356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14356"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14356",
"url": "https://www.suse.com/security/cve/CVE-2018-14356"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14356",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101576 for CVE-2018-14356",
"url": "https://bugzilla.suse.com/1101576"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14356",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14356",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14356"
},
{
"cve": "CVE-2018-14357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14357"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14357",
"url": "https://www.suse.com/security/cve/CVE-2018-14357"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14357",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101573 for CVE-2018-14357",
"url": "https://bugzilla.suse.com/1101573"
},
{
"category": "external",
"summary": "SUSE Bug 1101581 for CVE-2018-14357",
"url": "https://bugzilla.suse.com/1101581"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14357",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14357",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-14357"
},
{
"cve": "CVE-2018-14358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14358"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long RFC822.SIZE field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14358",
"url": "https://www.suse.com/security/cve/CVE-2018-14358"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14358",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101571 for CVE-2018-14358",
"url": "https://bugzilla.suse.com/1101571"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14358",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14358"
},
{
"cve": "CVE-2018-14359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14359"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They have a buffer overflow via base64 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14359",
"url": "https://www.suse.com/security/cve/CVE-2018-14359"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14359",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101570 for CVE-2018-14359",
"url": "https://bugzilla.suse.com/1101570"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14359",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14359",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14359"
},
{
"cve": "CVE-2018-14360",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14360"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14360",
"url": "https://www.suse.com/security/cve/CVE-2018-14360"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14360",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101569 for CVE-2018-14360",
"url": "https://bugzilla.suse.com/1101569"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14360",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-14360"
},
{
"cve": "CVE-2018-14361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14361"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14361",
"url": "https://www.suse.com/security/cve/CVE-2018-14361"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14361",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101568 for CVE-2018-14361",
"url": "https://bugzilla.suse.com/1101568"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14361",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-14361"
},
{
"cve": "CVE-2018-14362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14362"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a \u0027/\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14362",
"url": "https://www.suse.com/security/cve/CVE-2018-14362"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14362",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101567 for CVE-2018-14362",
"url": "https://bugzilla.suse.com/1101567"
},
{
"category": "external",
"summary": "SUSE Bug 1101589 for CVE-2018-14362",
"url": "https://bugzilla.suse.com/1101589"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14362",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-14362"
},
{
"cve": "CVE-2018-14363",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-14363"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict \u0027/\u0027 characters that may have unsafe interaction with cache pathnames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-14363",
"url": "https://www.suse.com/security/cve/CVE-2018-14363"
},
{
"category": "external",
"summary": "SUSE Bug 1101428 for CVE-2018-14363",
"url": "https://bugzilla.suse.com/1101428"
},
{
"category": "external",
"summary": "SUSE Bug 1101566 for CVE-2018-14363",
"url": "https://bugzilla.suse.com/1101566"
},
{
"category": "external",
"summary": "SUSE Bug 1101593 for CVE-2018-14363",
"url": "https://bugzilla.suse.com/1101593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-14363"
},
{
"cve": "CVE-2020-14093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14093"
}
],
"notes": [
{
"category": "general",
"text": "Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14093",
"url": "https://www.suse.com/security/cve/CVE-2020-14093"
},
{
"category": "external",
"summary": "SUSE Bug 1172906 for CVE-2020-14093",
"url": "https://bugzilla.suse.com/1172906"
},
{
"category": "external",
"summary": "SUSE Bug 1172935 for CVE-2020-14093",
"url": "https://bugzilla.suse.com/1172935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14093"
},
{
"cve": "CVE-2020-14954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14954"
}
],
"notes": [
{
"category": "general",
"text": "Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a \"begin TLS\" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka \"response injection.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14954",
"url": "https://www.suse.com/security/cve/CVE-2020-14954"
},
{
"category": "external",
"summary": "SUSE Bug 1173197 for CVE-2020-14954",
"url": "https://bugzilla.suse.com/1173197"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14954"
},
{
"cve": "CVE-2020-28896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28896"
}
],
"notes": [
{
"category": "general",
"text": "Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server\u0027s initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28896",
"url": "https://www.suse.com/security/cve/CVE-2020-28896"
},
{
"category": "external",
"summary": "SUSE Bug 1179035 for CVE-2020-28896",
"url": "https://bugzilla.suse.com/1179035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-28896"
},
{
"cve": "CVE-2021-3181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3181"
}
],
"notes": [
{
"category": "general",
"text": "rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the victim may then be unable to see email messages from other persons.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3181",
"url": "https://www.suse.com/security/cve/CVE-2021-3181"
},
{
"category": "external",
"summary": "SUSE Bug 1181221 for CVE-2021-3181",
"url": "https://bugzilla.suse.com/1181221"
},
{
"category": "external",
"summary": "SUSE Bug 1181505 for CVE-2021-3181",
"url": "https://bugzilla.suse.com/1181505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3181"
},
{
"cve": "CVE-2021-32055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32055"
}
],
"notes": [
{
"category": "general",
"text": "Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32055",
"url": "https://www.suse.com/security/cve/CVE-2021-32055"
},
{
"category": "external",
"summary": "SUSE Bug 1185705 for CVE-2021-32055",
"url": "https://bugzilla.suse.com/1185705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mutt-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-doc-2.0.7-2.2.x86_64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.aarch64",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.ppc64le",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.s390x",
"openSUSE Tumbleweed:mutt-lang-2.0.7-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-32055"
}
]
}
OPENSUSE-SU-2024:10686-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "claws-mail-4.0.0-2.5 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the claws-mail-4.0.0-2.5 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10686",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10686-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1558 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15917 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15917/"
}
],
"title": "claws-mail-4.0.0-2.5 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10686-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "claws-mail-4.0.0-2.5.aarch64",
"product": {
"name": "claws-mail-4.0.0-2.5.aarch64",
"product_id": "claws-mail-4.0.0-2.5.aarch64"
}
},
{
"category": "product_version",
"name": "claws-mail-devel-4.0.0-2.5.aarch64",
"product": {
"name": "claws-mail-devel-4.0.0-2.5.aarch64",
"product_id": "claws-mail-devel-4.0.0-2.5.aarch64"
}
},
{
"category": "product_version",
"name": "claws-mail-lang-4.0.0-2.5.aarch64",
"product": {
"name": "claws-mail-lang-4.0.0-2.5.aarch64",
"product_id": "claws-mail-lang-4.0.0-2.5.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "claws-mail-4.0.0-2.5.ppc64le",
"product": {
"name": "claws-mail-4.0.0-2.5.ppc64le",
"product_id": "claws-mail-4.0.0-2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "claws-mail-devel-4.0.0-2.5.ppc64le",
"product": {
"name": "claws-mail-devel-4.0.0-2.5.ppc64le",
"product_id": "claws-mail-devel-4.0.0-2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "claws-mail-lang-4.0.0-2.5.ppc64le",
"product": {
"name": "claws-mail-lang-4.0.0-2.5.ppc64le",
"product_id": "claws-mail-lang-4.0.0-2.5.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "claws-mail-4.0.0-2.5.s390x",
"product": {
"name": "claws-mail-4.0.0-2.5.s390x",
"product_id": "claws-mail-4.0.0-2.5.s390x"
}
},
{
"category": "product_version",
"name": "claws-mail-devel-4.0.0-2.5.s390x",
"product": {
"name": "claws-mail-devel-4.0.0-2.5.s390x",
"product_id": "claws-mail-devel-4.0.0-2.5.s390x"
}
},
{
"category": "product_version",
"name": "claws-mail-lang-4.0.0-2.5.s390x",
"product": {
"name": "claws-mail-lang-4.0.0-2.5.s390x",
"product_id": "claws-mail-lang-4.0.0-2.5.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "claws-mail-4.0.0-2.5.x86_64",
"product": {
"name": "claws-mail-4.0.0-2.5.x86_64",
"product_id": "claws-mail-4.0.0-2.5.x86_64"
}
},
{
"category": "product_version",
"name": "claws-mail-devel-4.0.0-2.5.x86_64",
"product": {
"name": "claws-mail-devel-4.0.0-2.5.x86_64",
"product_id": "claws-mail-devel-4.0.0-2.5.x86_64"
}
},
{
"category": "product_version",
"name": "claws-mail-lang-4.0.0-2.5.x86_64",
"product": {
"name": "claws-mail-lang-4.0.0-2.5.x86_64",
"product_id": "claws-mail-lang-4.0.0-2.5.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-4.0.0-2.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64"
},
"product_reference": "claws-mail-4.0.0-2.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-4.0.0-2.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le"
},
"product_reference": "claws-mail-4.0.0-2.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-4.0.0-2.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x"
},
"product_reference": "claws-mail-4.0.0-2.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-4.0.0-2.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64"
},
"product_reference": "claws-mail-4.0.0-2.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-devel-4.0.0-2.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64"
},
"product_reference": "claws-mail-devel-4.0.0-2.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-devel-4.0.0-2.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le"
},
"product_reference": "claws-mail-devel-4.0.0-2.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-devel-4.0.0-2.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x"
},
"product_reference": "claws-mail-devel-4.0.0-2.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-devel-4.0.0-2.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64"
},
"product_reference": "claws-mail-devel-4.0.0-2.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-lang-4.0.0-2.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64"
},
"product_reference": "claws-mail-lang-4.0.0-2.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-lang-4.0.0-2.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le"
},
"product_reference": "claws-mail-lang-4.0.0-2.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-lang-4.0.0-2.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x"
},
"product_reference": "claws-mail-lang-4.0.0-2.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "claws-mail-lang-4.0.0-2.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
},
"product_reference": "claws-mail-lang-4.0.0-2.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1558"
}
],
"notes": [
{
"category": "general",
"text": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1558",
"url": "https://www.suse.com/security/cve/CVE-2007-1558"
},
{
"category": "external",
"summary": "SUSE Bug 262450 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/262450"
},
{
"category": "external",
"summary": "SUSE Bug 271197 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/271197"
},
{
"category": "external",
"summary": "SUSE Bug 279843 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/279843"
},
{
"category": "external",
"summary": "SUSE Bug 281321 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281321"
},
{
"category": "external",
"summary": "SUSE Bug 281323 for CVE-2007-1558",
"url": "https://bugzilla.suse.com/281323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-1558"
},
{
"cve": "CVE-2020-15917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15917"
}
],
"notes": [
{
"category": "general",
"text": "common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15917",
"url": "https://www.suse.com/security/cve/CVE-2020-15917"
},
{
"category": "external",
"summary": "SUSE Bug 1174457 for CVE-2020-15917",
"url": "https://bugzilla.suse.com/1174457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-devel-4.0.0-2.5.x86_64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.aarch64",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.ppc64le",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.s390x",
"openSUSE Tumbleweed:claws-mail-lang-4.0.0-2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-15917"
}
]
}
JVNDB-2007-000295
Vulnerability from jvndb - Published: 2008-05-21 00:00 - Updated:2009-08-06 11:39| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000295.html",
"dc:date": "2009-08-06T11:39+09:00",
"dcterms:issued": "2008-05-21T00:00+09:00",
"dcterms:modified": "2009-08-06T11:39+09:00",
"description": "POP3 is a protocol for receiving email from mail servers. APOP is an authentication mechanism used by the POP3 protocol.\r\n\r\nIt is reported that APOP passwords could be recovered by third parties.\r\n\r\nIn its successful attack, the attacker spoofs itself as the mail server, provides challenge strings to the client, and collects the responses from the client. The attacker should repeat this process for a certain period of time without alerting the user of the attack.",
"link": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000295.html",
"sec:cpe": [
{
"#text": "cpe:/a:claws_mail:claws_mail",
"@product": "Claws Mail",
"@vendor": "Claws Mail",
"@version": "2.2"
},
{
"#text": "cpe:/a:fetchmail:fetchmail",
"@product": "Fetchmail",
"@vendor": "Fetchmail Project",
"@version": "2.2"
},
{
"#text": "cpe:/a:mozilla:seamonkey",
"@product": "Mozilla SeaMonkey",
"@vendor": "mozilla.org contributors",
"@version": "2.2"
},
{
"#text": "cpe:/a:mozilla:thunderbird",
"@product": "Mozilla Thunderbird",
"@vendor": "mozilla.org contributors",
"@version": "2.2"
},
{
"#text": "cpe:/a:mutt:mutt",
"@product": "Mutt",
"@vendor": "Mutt",
"@version": "2.2"
},
{
"#text": "cpe:/a:redhat:rhel_optional_productivity_applications",
"@product": "RHEL Optional Productivity Applications",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/a:sylpheed:sylpheed",
"@product": "Sylpheed",
"@vendor": "Sylpheed",
"@version": "2.2"
},
{
"#text": "cpe:/o:hp:hp-ux",
"@product": "HP-UX",
"@vendor": "Hewlett-Packard Development Company,L.P",
"@version": "2.2"
},
{
"#text": "cpe:/o:misc:miraclelinux_asianux_server",
"@product": "Asianux Server",
"@vendor": "Cybertrust Japan Co., Ltd.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux",
"@product": "Red Hat Enterprise Linux",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux_desktop",
"@product": "Red Hat Enterprise Linux Desktop",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:enterprise_linux_eus",
"@product": "Red Hat Enterprise Linux EUS",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:linux_advanced_workstation",
"@product": "Red Hat Linux Advanced Workstation",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:redhat:rhel_desktop_workstation",
"@product": "RHEL Desktop Workstation",
"@vendor": "Red Hat, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux",
"@product": "Turbolinux",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_desktop",
"@product": "Turbolinux Desktop",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_fuji",
"@product": "Turbolinux FUJI",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_home",
"@product": "Turbolinux Home",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_multimedia",
"@product": "Turbolinux Multimedia",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_personal",
"@product": "Turbolinux Personal",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_server",
"@product": "Turbolinux Server",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:turbolinux:turbolinux_wizpy",
"@product": "wizpy",
"@vendor": "Turbolinux, Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "5.4",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2007-000295",
"sec:references": [
{
"#text": "http://jvn.jp/cert/JVNTA07-151A/index.html",
"@id": "JVNTA07-151A",
"@source": "JVN"
},
{
"#text": "http://jvn.jp/en/jp/JVN19445002/index.html",
"@id": "JVN#19445002",
"@source": "JVN"
},
{
"#text": "http://jvn.jp/tr/TRTA07-151A/index.html",
"@id": "TRTA07-151A",
"@source": "JVNTR"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558",
"@id": "CVE-2007-1558",
"@source": "CVE"
},
{
"#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1558",
"@id": "CVE-2007-1558",
"@source": "NVD"
},
{
"#text": "http://www.us-cert.gov/cas/alerts/SA07-151A.html",
"@id": "SA07-151A",
"@source": "CERT-SA"
},
{
"#text": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html",
"@id": "TA07-151A",
"@source": "CERT-TA"
},
{
"#text": "http://www.securityfocus.com/bid/23257",
"@id": "23257",
"@source": "BID"
},
{
"#text": "http://www.securitytracker.com/id?1018008",
"@id": "1018008",
"@source": "SECTRACK"
},
{
"#text": "http://www.frsirt.com/english/advisories/2007/1466",
"@id": "FrSIRT/ADV-2007-1466",
"@source": "FRSIRT"
},
{
"#text": "http://www.frsirt.com/english/advisories/2007/1480",
"@id": "FrSIRT/ADV-2007-1480",
"@source": "FRSIRT"
},
{
"#text": "http://www.frsirt.com/english/advisories/2007/1468",
"@id": "FrSIRT/ADV-2007-1468",
"@source": "FRSIRT"
},
{
"#text": "http://www.frsirt.com/english/advisories/2007/1467",
"@id": "FrSIRT/ADV-2007-1467",
"@source": "FRSIRT"
},
{
"#text": "http://www.ietf.org/rfc/rfc1939.txt",
"@id": "RFC1939:Post Office Protocol - Version 3",
"@source": "IETF"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-264",
"@title": "Permissions(CWE-264)"
}
],
"title": "APOP password recovery vulnerability"
}
CERTA-2007-AVI-245
Vulnerability from certfr_avis - Published: 2007-06-01 - Updated: 2007-06-01None
Description
De nombreuses vulnérabilités dans les produits Mozilla permettent à un utilisateur distant malintentionné de provoquer un déni de service, d'exécuter du code arbitraire ou de porter atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox | Mozilla Firefox 2.x ; | ||
| Mozilla | Thunderbird | Mozilla Thunderbird 2.x ; | ||
| Mozilla | Firefox | Mozilla Firefox 1.5.x ; | ||
| Mozilla | Thunderbird | Mozilla Thunderbird 1.5.x ; | ||
| Mozilla | N/A | Mozilla SeaMonkey 1.x. |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox 2.x ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird 2.x ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Firefox 1.5.x ;",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Thunderbird 1.5.x ;",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla SeaMonkey 1.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s dans les produits Mozilla permettent \u00e0 un\nutilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de service,\nd\u0027ex\u00e9cuter du code arbitraire ou de porter atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2867"
},
{
"name": "CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"name": "CVE-2007-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2870"
},
{
"name": "CVE-2007-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2868"
},
{
"name": "CVE-2007-2871",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2871"
},
{
"name": "CVE-2007-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2869"
},
{
"name": "CVE-2007-1362",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1362"
}
],
"initial_release_date": "2007-06-01T00:00:00",
"last_revision_date": "2007-06-01T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-13 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-13.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-14 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-14.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0402 du 30 mai 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0402.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-12 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-12.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-17 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-17.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0400 du 30 mai 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0400.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0401 du 30 mai 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0401.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-16 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-16.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla MFSA_2007-15 du 30 mai 2007 :",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
}
],
"reference": "CERTA-2007-AVI-245",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-06-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletins de s\u00e9curit\u00e9 Mozilla du 30 mai 2007",
"url": null
}
]
}
CERTA-2007-AVI-234
Vulnerability from certfr_avis - Published: 2007-05-30 - Updated: 2007-05-30
Plusieurs vulnérabilités ont été identifiées : elles concernent le système d'exploitation Mac OS X. L'exploitation de ces dernières peut avoir des conséquences variées, comme l'exécution de code arbitraire, ou un dysfonctionnement du système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Mac OS X. Parmi celles-ci :
- Alias Manager : il existerait, sous certaines conditions, une incohérence sur les noms de fichier lorsque deux images disque sont montées. Cette vulnérabilité pourrait être exploitée pour faire ouvrir et/ou exécuter un fichier différent de celui demandé sur le système vulnérable ;
- BIND : plusieurs vulnérabilités ont été corrigées dans le serveur DNS pour Mac OS X. Elles sont semblables à celles décrites dans les avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;
- CoreGraphics : l'application ne manipulerait pas correctement certains fichiers au format PDF (pour Portable Document Format), pouvant entraîner l'exécution de commande arbitraire à distance ;
- crontabs : le gestionnaire de tâches pourrait perturber le système de fichiers monté dans le répertoire /tmp, par le biais du script de nettoyage journalier.
- fetchmail : une vulnérabilité présente dans fetchmail permettrait de récupérer tout ou partie d'un mot de passe échangé au cours de l'initialisation de la connexion POP3. Cette vulnérabilité est différente de celle décrite dans CERTA-2007-AVI-020.
- file : la commande file ne manipule pas correctement certains fichiers, ce qui peut provoquer l'interruption de la commande, voire l'exécution de code arbitraire sur le système vulnérable.
- iChat : l'application de messagerie instantanée ne gère pas correctement certains paquets UPnP IGD (pour Internet Gateway Device Standardized Device Control Protocol). Une personne malveillante distante peut ainsi exploiter cette vulnérabilité en envoyant un paquet spécialement construit, afin de perturber l'application ou d'exécuter du code arbitraire à distance.
- mDNSResponder : le problème est identique à celui présenté pour iChat mais n'affecterait que les versions au moins équivalentes à Mac OS X v10.4 ;
- PPP : le démon PPP ne chargerait pas correctement certains modules au cours de son lancement en ligne de commandes, ce qui permettrait à une personne malveillante locale d'élever ses privilèges sur le système vulnérable ;
- ruby : les vulnérabilités corrigées ont été présentées dans l'avis CERTA-2006-AVI-562 ;
- screen : le service GNU Screen auraient plusieurs vulnérabilités exploitables par la ligne de commande screen, et qui provoqueraient sous certaines conditions un déni de service.
- texinfo : une vulnérabilité permettrait d'élever ses privilèges à ceux de l'utilisateur utilisant texinfo afin de créer ou d'écraser des fichiers d'accès limité.
- VPN : le démon vpnd ne manipulerait pas correctement certaines chaînes de caractères, permettant à un utilisateur local d'élever ses privilèges à ceux du système et d'exécuter du code arbitraire sur la machine.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Mac OS X Server v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.4.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X v10.3.9 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Mac OS X Server v10.4.9.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Mac OS X. Parmi celles-ci :\n\n- Alias Manager : il existerait, sous certaines conditions, une\n incoh\u00e9rence sur les noms de fichier lorsque deux images disque sont\n mont\u00e9es. Cette vuln\u00e9rabilit\u00e9 pourrait \u00eatre exploit\u00e9e pour faire\n ouvrir et/ou ex\u00e9cuter un fichier diff\u00e9rent de celui demand\u00e9 sur le\n syst\u00e8me vuln\u00e9rable ;\n- BIND : plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le serveur\n DNS pour Mac OS X. Elles sont semblables \u00e0 celles d\u00e9crites dans les\n avis CERTA-2006-AVI-385 et CERTA-2007-AVI-056 ;\n- CoreGraphics : l\u0027application ne manipulerait pas correctement\n certains fichiers au format PDF (pour Portable Document Format),\n pouvant entra\u00eener l\u0027ex\u00e9cution de commande arbitraire \u00e0 distance ;\n- crontabs : le gestionnaire de t\u00e2ches pourrait perturber le syst\u00e8me\n de fichiers mont\u00e9 dans le r\u00e9pertoire /tmp, par le biais du script de\n nettoyage journalier.\n- fetchmail : une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans fetchmail permettrait de\n r\u00e9cup\u00e9rer tout ou partie d\u0027un mot de passe \u00e9chang\u00e9 au cours de\n l\u0027initialisation de la connexion POP3. Cette vuln\u00e9rabilit\u00e9 est\n diff\u00e9rente de celle d\u00e9crite dans CERTA-2007-AVI-020.\n- file : la commande file ne manipule pas correctement certains\n fichiers, ce qui peut provoquer l\u0027interruption de la commande, voire\n l\u0027ex\u00e9cution de code arbitraire sur le syst\u00e8me vuln\u00e9rable.\n- iChat : l\u0027application de messagerie instantan\u00e9e ne g\u00e8re pas\n correctement certains paquets UPnP IGD (pour Internet Gateway Device\n Standardized Device Control Protocol). Une personne malveillante\n distante peut ainsi exploiter cette vuln\u00e9rabilit\u00e9 en envoyant un\n paquet sp\u00e9cialement construit, afin de perturber l\u0027application ou\n d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n- mDNSResponder : le probl\u00e8me est identique \u00e0 celui pr\u00e9sent\u00e9 pour\n iChat mais n\u0027affecterait que les versions au moins \u00e9quivalentes \u00e0\n Mac OS X v10.4 ;\n- PPP : le d\u00e9mon PPP ne chargerait pas correctement certains modules\n au cours de son lancement en ligne de commandes, ce qui permettrait\n \u00e0 une personne malveillante locale d\u0027\u00e9lever ses privil\u00e8ges sur le\n syst\u00e8me vuln\u00e9rable ;\n- ruby : les vuln\u00e9rabilit\u00e9s corrig\u00e9es ont \u00e9t\u00e9 pr\u00e9sent\u00e9es dans l\u0027avis\n CERTA-2006-AVI-562 ;\n- screen : le service GNU Screen auraient plusieurs vuln\u00e9rabilit\u00e9s\n exploitables par la ligne de commande screen, et qui provoqueraient\n sous certaines conditions un d\u00e9ni de service.\n- texinfo : une vuln\u00e9rabilit\u00e9 permettrait d\u0027\u00e9lever ses privil\u00e8ges \u00e0\n ceux de l\u0027utilisateur utilisant texinfo afin de cr\u00e9er ou d\u0027\u00e9craser\n des fichiers d\u0027acc\u00e8s limit\u00e9.\n- VPN : le d\u00e9mon vpnd ne manipulerait pas correctement certaines\n cha\u00eenes de caract\u00e8res, permettant \u00e0 un utilisateur local d\u0027\u00e9lever\n ses privil\u00e8ges \u00e0 ceux du syst\u00e8me et d\u0027ex\u00e9cuter du code arbitraire\n sur la machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-5467",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5467"
},
{
"name": "CVE-2007-1558",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1558"
},
{
"name": "CVE-2006-6303",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-6303"
},
{
"name": "CVE-2007-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0751"
},
{
"name": "CVE-2007-1536",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1536"
},
{
"name": "CVE-2007-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0494"
},
{
"name": "CVE-2006-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4096"
},
{
"name": "CVE-2007-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2386"
},
{
"name": "CVE-2007-4573",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4573"
},
{
"name": "CVE-2007-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0493"
},
{
"name": "CVE-2007-0752",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0752"
},
{
"name": "CVE-2007-0750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0750"
},
{
"name": "CVE-2007-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2390"
},
{
"name": "CVE-2007-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0740"
},
{
"name": "CVE-2006-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4095"
},
{
"name": "CVE-2007-0753",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0753"
},
{
"name": "CVE-2005-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3011"
}
],
"initial_release_date": "2007-05-30T00:00:00",
"last_revision_date": "2007-05-30T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple du 29 mai 2007 :",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"title": "Message dans la liste de diffusion GNU concernant GNU Screen paru en octobre 2006 :",
"url": "http://lists.gnu.org/archive/html/screen-users/2006-10/msg00028.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 Fetchmail associ\u00e9 SA-2007-01 du 18 mars 2007 :",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
}
],
"reference": "CERTA-2007-AVI-234",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es : elles concernent le\nsyst\u00e8me d\u0027exploitation Mac OS X. L\u0027exploitation de ces derni\u00e8res peut\navoir des cons\u00e9quences vari\u00e9es, comme l\u0027ex\u00e9cution de code arbitraire, ou\nun dysfonctionnement du syst\u00e8me vuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Apple 2007-005 305530 du 29 mai 2007",
"url": null
}
]
}
GSD-2007-1558
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-1558",
"description": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"id": "GSD-2007-1558",
"references": [
"https://www.suse.com/security/cve/CVE-2007-1558.html",
"https://www.debian.org/security/2007/dsa-1305",
"https://www.debian.org/security/2007/dsa-1300",
"https://access.redhat.com/errata/RHSA-2009:1140",
"https://access.redhat.com/errata/RHSA-2007:0402",
"https://access.redhat.com/errata/RHSA-2007:0401",
"https://access.redhat.com/errata/RHSA-2007:0386",
"https://access.redhat.com/errata/RHSA-2007:0385",
"https://access.redhat.com/errata/RHSA-2007:0353",
"https://access.redhat.com/errata/RHSA-2007:0344",
"https://linux.oracle.com/cve/CVE-2007-1558.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-1558"
],
"details": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"id": "GSD-2007-1558",
"modified": "2023-12-13T01:21:39.363392Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1558",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "25496",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25496"
},
{
"name": "25529",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25529"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=683706",
"refsource": "CONFIRM",
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "http://www.claws-mail.org/news.php",
"refsource": "CONFIRM",
"url": "http://www.claws-mail.org/news.php"
},
{
"name": "MDKSA-2007:107",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name": "2007-0024",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "20070403 Re: APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"name": "25894",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25894"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "26083",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26083"
},
{
"name": "ADV-2007-1468",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "RHSA-2009:1140",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "26415",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26415"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"refsource": "CONFIRM",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "SUSE-SR:2007:014",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "25402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25402"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "20070402 APOP vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "SUSE-SA:2007:036",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "GLSA-200706-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"name": "http://sylpheed.sraoss.jp/en/news.html",
"refsource": "CONFIRM",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "25534",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25534"
},
{
"name": "ADV-2007-1994",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "SSA:2007-152-02",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"name": "23257",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "USN-469-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "MDKSA-2007:131",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "DSA-1305",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"name": "https://issues.rpath.com/browse/RPL-1231",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "ADV-2007-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html",
"refsource": "CONFIRM",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "ADV-2007-2788",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "SSRT061236",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "https://issues.rpath.com/browse/RPL-1424",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "25664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25664"
},
{
"name": "MDKSA-2007:119",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "25546",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25546"
},
{
"name": "RHSA-2007:0353",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "RHSA-2007:0385",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "25858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25858"
},
{
"name": "25798",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25353",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25353"
},
{
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "RHSA-2007:0401",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "2007-0019",
"refsource": "TRUSTIX",
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "25476",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25476"
},
{
"name": "35699",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35699"
},
{
"name": "MDKSA-2007:113",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"refsource": "MLIST",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "SSRT061181",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "MDKSA-2007:105",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "RHSA-2007:0386",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1232",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "25750",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25750"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "DSA-1300",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "25559",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25559"
},
{
"name": "ADV-2007-1466",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "1018008",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "oval:org.mitre.oval:def:9782",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070602-01-P",
"refsource": "SGI",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "RHSA-2007:0402",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "ADV-2007-1480",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "TA07-151A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name": "RHSA-2007:0344",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"name": "http://balsa.gnome.org/download.html",
"refsource": "CONFIRM",
"url": "http://balsa.gnome.org/download.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apop_protocol:apop_protocol:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-1558"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20070402 APOP vulnerability",
"refsource": "BUGTRAQ",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"name": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"name": "http://sourceforge.net/forum/forum.php?forum_id=683706",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"name": "http://sylpheed.sraoss.jp/en/news.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"name": "http://www.claws-mail.org/news.php",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.claws-mail.org/news.php"
},
{
"name": "23257",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/23257"
},
{
"name": "RHSA-2007:0353",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"name": "1018008",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1018008"
},
{
"name": "[balsa-list] 20070704 balsa-2.3.17 released",
"refsource": "MLIST",
"tags": [],
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"name": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"name": "https://issues.rpath.com/browse/RPL-1424",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"name": "https://issues.rpath.com/browse/RPL-1232",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"name": "https://issues.rpath.com/browse/RPL-1231",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"name": "http://balsa.gnome.org/download.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://balsa.gnome.org/download.html"
},
{
"name": "APPLE-SA-2007-05-24",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"name": "DSA-1300",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"name": "DSA-1305",
"refsource": "DEBIAN",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"name": "GLSA-200706-06",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"name": "MDKSA-2007:105",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"name": "MDKSA-2007:107",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"name": "MDKSA-2007:113",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"name": "MDKSA-2007:119",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"name": "MDKSA-2007:131",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"name": "RHSA-2007:0344",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"name": "RHSA-2007:0386",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"name": "RHSA-2007:0385",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"name": "RHSA-2007:0401",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"name": "RHSA-2007:0402",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"name": "20070602-01-P",
"refsource": "SGI",
"tags": [],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"name": "SSA:2007-152-02",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"name": "SUSE-SA:2007:036",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"name": "SUSE-SR:2007:014",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"name": "2007-0019",
"refsource": "TRUSTIX",
"tags": [],
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"name": "2007-0024",
"refsource": "TRUSTIX",
"tags": [],
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"name": "USN-469-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"name": "USN-520-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"name": "TA07-151A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"name": "25353",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25353"
},
{
"name": "25402",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"name": "25476",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25476"
},
{
"name": "25529",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25529"
},
{
"name": "25546",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25546"
},
{
"name": "25496",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25496"
},
{
"name": "25559",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25559"
},
{
"name": "25534",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25534"
},
{
"name": "25664",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25664"
},
{
"name": "25750",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25750"
},
{
"name": "25798",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25798"
},
{
"name": "25894",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25894"
},
{
"name": "26083",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26083"
},
{
"name": "26415",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26415"
},
{
"name": "25858",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25858"
},
{
"name": "RHSA-2009:1140",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"name": "35699",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35699"
},
{
"name": "[oss-security] 20090818 Re: CVE-2007-1558 update (was: mailfilter 0.8.2 fixes CVE-2007-1558 (APOP))",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"name": "[oss-security] 20090815 mailfilter 0.8.2 fixes CVE-2007-1558 (APOP)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"name": "HPSBUX02153",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"name": "HPSBUX02156",
"refsource": "HP",
"tags": [],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"name": "ADV-2007-1466",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"name": "ADV-2007-1939",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"name": "ADV-2007-1467",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"name": "ADV-2007-2788",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"name": "ADV-2008-0082",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"name": "ADV-2007-1994",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"name": "ADV-2007-1480",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"name": "ADV-2007-1468",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305530",
"refsource": "CONFIRM",
"tags": [],
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"name": "oval:org.mitre.oval:def:9782",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"name": "20070620 FLEA-2007-0027-1: thunderbird",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"name": "20070619 FLEA-2007-0026-1: evolution-data-server",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"name": "20070615 rPSA-2007-0122-1 evolution-data-server",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"name": "20070531 FLEA-2007-0023-1: firefox",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"name": "20070403 Re: APOP vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-16T16:39Z",
"publishedDate": "2007-04-16T22:19Z"
}
}
}
GHSA-JMH6-7C53-FG26
Vulnerability from github – Published: 2022-05-03 03:18 – Updated: 2022-05-03 03:18The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
{
"affected": [],
"aliases": [
"CVE-2007-1558"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-04-16T22:19:00Z",
"severity": "LOW"
},
"details": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.",
"id": "GHSA-jmh6-7c53-fg26",
"modified": "2022-05-03T03:18:06Z",
"published": "2022-05-03T03:18:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1558"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"type": "WEB",
"url": "http://balsa.gnome.org/download.html"
},
{
"type": "WEB",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"type": "WEB",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"type": "WEB",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25353"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25402"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25476"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25496"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25529"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25534"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25546"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25559"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25664"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25750"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25798"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25858"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25894"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26083"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26415"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35699"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"type": "WEB",
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"type": "WEB",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"type": "WEB",
"url": "http://www.claws-mail.org/news.php"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"type": "WEB",
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/23257"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"type": "WEB",
"url": "http://www.trustix.org/errata/2007/0019"
},
{
"type": "WEB",
"url": "http://www.trustix.org/errata/2007/0024"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0082"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2007-1558
Vulnerability from fkie_nvd - Published: 2007-04-16 22:19 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | ||
| cve@mitre.org | http://balsa.gnome.org/download.html | ||
| cve@mitre.org | http://docs.info.apple.com/article.html?artnum=305530 | ||
| cve@mitre.org | http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt | ||
| cve@mitre.org | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 | ||
| cve@mitre.org | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2007/May/msg00004.html | ||
| cve@mitre.org | http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html | ||
| cve@mitre.org | http://secunia.com/advisories/25353 | ||
| cve@mitre.org | http://secunia.com/advisories/25402 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25476 | ||
| cve@mitre.org | http://secunia.com/advisories/25496 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25529 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25534 | ||
| cve@mitre.org | http://secunia.com/advisories/25546 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/25559 | ||
| cve@mitre.org | http://secunia.com/advisories/25664 | ||
| cve@mitre.org | http://secunia.com/advisories/25750 | ||
| cve@mitre.org | http://secunia.com/advisories/25798 | ||
| cve@mitre.org | http://secunia.com/advisories/25858 | ||
| cve@mitre.org | http://secunia.com/advisories/25894 | ||
| cve@mitre.org | http://secunia.com/advisories/26083 | ||
| cve@mitre.org | http://secunia.com/advisories/26415 | ||
| cve@mitre.org | http://secunia.com/advisories/35699 | ||
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-200706-06.xml | ||
| cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857 | ||
| cve@mitre.org | http://sourceforge.net/forum/forum.php?forum_id=683706 | ||
| cve@mitre.org | http://sylpheed.sraoss.jp/en/news.html | ||
| cve@mitre.org | http://www.claws-mail.org/news.php | ||
| cve@mitre.org | http://www.debian.org/security/2007/dsa-1300 | ||
| cve@mitre.org | http://www.debian.org/security/2007/dsa-1305 | Patch | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:105 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:107 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:113 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:119 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2007:131 | ||
| cve@mitre.org | http://www.mozilla.org/security/announce/2007/mfsa2007-15.html | Patch, Vendor Advisory | |
| cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_14_sr.html | ||
| cve@mitre.org | http://www.novell.com/linux/security/advisories/2007_36_mozilla.html | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2009/08/15/1 | ||
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2009/08/18/1 | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0344.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0353.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0385.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0386.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0401.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-0402.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1140.html | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/464477/30/0/threaded | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/464569/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/470172/100/200/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/471455/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/471720/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/471842/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/23257 | Patch | |
| cve@mitre.org | http://www.securitytracker.com/id?1018008 | ||
| cve@mitre.org | http://www.trustix.org/errata/2007/0019/ | ||
| cve@mitre.org | http://www.trustix.org/errata/2007/0024/ | ||
| cve@mitre.org | http://www.ubuntu.com/usn/usn-469-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/usn-520-1 | ||
| cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA07-151A.html | US Government Resource | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1466 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1467 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1468 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1480 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1939 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/1994 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2007/2788 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/0082 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-1231 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-1232 | ||
| cve@mitre.org | https://issues.rpath.com/browse/RPL-1424 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782 | ||
| af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://balsa.gnome.org/download.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=305530 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2007/May/msg00004.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25353 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25402 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25476 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25496 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25529 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25534 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25546 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25559 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25664 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25750 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25798 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25858 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25894 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26083 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26415 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35699 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200706-06.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/forum/forum.php?forum_id=683706 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sylpheed.sraoss.jp/en/news.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.claws-mail.org/news.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1300 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1305 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:105 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:107 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:113 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:119 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:131 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mozilla.org/security/announce/2007/mfsa2007-15.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_14_sr.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_36_mozilla.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/08/15/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/08/18/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0344.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0353.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0385.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0386.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0401.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0402.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1140.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/464477/30/0/threaded | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/464569/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/470172/100/200/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/471455/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/471720/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/471842/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/23257 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018008 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0019/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.trustix.org/errata/2007/0024/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-469-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-520-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-151A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1466 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1467 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1468 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1480 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1939 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1994 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2788 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0082 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1231 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1232 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1424 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782 |
| Vendor | Product | Version | |
|---|---|---|---|
| apop_protocol | apop_protocol | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apop_protocol:apop_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35A32BC4-9BE2-429C-9D9A-BE4DF4CD9F77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions. NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products."
},
{
"lang": "es",
"value": "El protocolo APOP permite a los atacantes remotos adivinar los primeros 3 caracteres de una contrase\u00f1a por medio de ataques de tipo man-in-the-middle (MITM) que utilizan ID de mensajes creados y colisiones MD5. NOTA: este problema a nivel de creaci\u00f3n afecta potencialmente a todos los productos que utilizan APOP, incluyendo (1) Thunderbird versi\u00f3n 1.x anterior a la versi\u00f3n 1.5.0.12 y versi\u00f3n 2.x anterior a la versi\u00f3n 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail anterior a la versi\u00f3n 6.3.8, (5) SeaMonkey versi\u00f3n 1.0.x anterior a la versi\u00f3n 1.0.9 y versi\u00f3n 1.1.x anterior a la versi\u00f3n 1.1.2, (6) Balsa versi\u00f3n 2.3.16 y anteriores, (7) Mailfilter anterior a la versi\u00f3n 0.8.2, y posiblemente otros productos."
}
],
"id": "CVE-2007-1558",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-04-16T22:19:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"source": "cve@mitre.org",
"url": "http://balsa.gnome.org/download.html"
},
{
"source": "cve@mitre.org",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"source": "cve@mitre.org",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"source": "cve@mitre.org",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"source": "cve@mitre.org",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"source": "cve@mitre.org",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25353"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25476"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25496"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25529"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25534"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25546"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25559"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25664"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25750"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25798"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25858"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/25894"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26083"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/26415"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35699"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"source": "cve@mitre.org",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"source": "cve@mitre.org",
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"source": "cve@mitre.org",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.claws-mail.org/news.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/23257"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"source": "cve@mitre.org",
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"source": "cve@mitre.org",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://balsa.gnome.org/download.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://docs.info.apple.com/article.html?artnum=305530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://fetchmail.berlios.de/fetchmail-SA-2007-01.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25353"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25496"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/25546"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25559"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25750"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200706-06.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.571857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sourceforge.net/forum/forum.php?forum_id=683706"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sylpheed.sraoss.jp/en/news.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.claws-mail.org/news.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2007/dsa-1305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:107"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.mozilla.org/security/announce/2007/mfsa2007-15.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_36_mozilla.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/08/15/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/08/18/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0344.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0353.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0385.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0386.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0401.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0402.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1140.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/archive/1/464477/30/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/464569/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/470172/100/200/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/471455/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/471720/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/471842/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/23257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1018008"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trustix.org/errata/2007/0019/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.trustix.org/errata/2007/0024/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-469-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-520-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-151A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/1994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2788"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0082"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-1424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.