Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2834 (GCVE-0-2011-2834)
Vulnerability from cvelistv5 – Published: 2011-09-17 10:00 – Updated: 2024-08-06 23:15- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:31.160Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "MDVSA-2011:145",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"name": "HPSBMU02786",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "APPLE-SA-2012-09-19-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "75560",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/75560"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "RHSA-2013:0217",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "oval:org.mitre.oval:def:14410",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"name": "RHSA-2011:1749",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"name": "chrome-libxml-code-execution(69885)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"name": "SSRT100877",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "DSA-2394",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2394"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-09-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"name": "MDVSA-2011:145",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"name": "HPSBMU02786",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "APPLE-SA-2012-09-19-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "75560",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/75560"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "RHSA-2013:0217",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "oval:org.mitre.oval:def:14410",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"name": "RHSA-2011:1749",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"name": "chrome-libxml-code-execution(69885)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"name": "SSRT100877",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "DSA-2394",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2394"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2011:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"name": "HPSBMU02786",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "75560",
"refsource": "OSVDB",
"url": "http://osvdb.org/75560"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "RHSA-2013:0217",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "oval:org.mitre.oval:def:14410",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"name": "RHSA-2011:1749",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=93472",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"name": "chrome-libxml-code-execution(69885)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"name": "SSRT100877",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "DSA-2394",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2394"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2011-2834",
"datePublished": "2011-09-17T10:00:00",
"dateReserved": "2011-07-20T00:00:00",
"dateUpdated": "2024-08-06T23:15:31.160Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2834\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2011-09-19T12:02:55.620\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de doble liberaci\u00f3n en libxml2, tal y como se usa en Google Chrome antes de v14.0.835.163, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores relacionados con el manejo de XPath.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0.835.163\",\"matchCriteriaId\":\"56B5D5D9-5161-486F-90AE-482AAD0F279E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0\",\"matchCriteriaId\":\"72A06974-6834-406E-BB3E-F9935B18F877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.7.4\",\"matchCriteriaId\":\"7F141010-3825-453D-BD01-93A929D3C02C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"413CC30E-5FFE-47A4-B38B-80E3A9B13238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=93472\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://osvdb.org/75560\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0217.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2394\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:145\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1749.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69885\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=93472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/75560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0217.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1749.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/69885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2012-AVI-387
Vulnerability from certfr_avis - Published: 2012-07-13 - Updated: 2012-07-13
Neuf vulnérabilités concernant la bibliothèque libxml2 ont été corrigées dans VMware ESXi.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESXi 3.5.",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.1 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 4.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi 5.0 ;",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2011-3909",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3909"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
}
],
"initial_release_date": "2012-07-13T00:00:00",
"last_revision_date": "2012-07-13T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0012 du 12 juillet 2012 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0012.html"
}
],
"reference": "CERTA-2012-AVI-387",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Neuf vuln\u00e9rabilit\u00e9s concernant la biblioth\u00e8que \u003cspan\nclass=\"textit\"\u003elibxml2\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eVMware ESXi\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMSA-2012-0012 du 12 juillet 2012",
"url": null
}
]
}
CERTA-2012-AVI-272
Vulnerability from certfr_avis - Published: 2012-05-10 - Updated: 2012-05-10
Trente-six vulnérabilités ont été corrigées dans OS X Lion. Il est possible d'exécuter du code arbitraire à distance, d'exécuter du code en local, d'obtenir des données sensibles et d'élever ses privilèges. De nombreuses applications et fonctions sont touchées, toutes sont décrites dans le bulletin Apple référencé dans la section « Documentation ».
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Lion v10.7.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Lion v10.7.4.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2012-0675",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0675"
},
{
"name": "CVE-2012-0649",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0649"
},
{
"name": "CVE-2012-0661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0661"
},
{
"name": "CVE-2012-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0658"
},
{
"name": "CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"name": "CVE-2011-2692",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2692"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-0659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0659"
},
{
"name": "CVE-2011-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3212"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-0657",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0657"
},
{
"name": "CVE-2012-0652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0652"
},
{
"name": "CVE-2011-1778",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1778"
},
{
"name": "CVE-2011-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0241"
},
{
"name": "CVE-2012-0660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0660"
},
{
"name": "CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2012-0662",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0662"
},
{
"name": "CVE-2012-0655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0655"
},
{
"name": "CVE-2012-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0642"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2011-1777",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1777"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2012-0651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0651"
},
{
"name": "CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"name": "CVE-2012-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0830"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0656"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2012-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1182"
},
{
"name": "CVE-2012-0870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0870"
},
{
"name": "CVE-2012-0654",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0654"
}
],
"initial_release_date": "2012-05-10T00:00:00",
"last_revision_date": "2012-05-10T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-272",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Trente-six vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eOS\nX Lion\u003c/span\u003e. Il est possible d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance,\nd\u0027ex\u00e9cuter du code en local, d\u0027obtenir des donn\u00e9es sensibles et d\u0027\u00e9lever\nses privil\u00e8ges. De nombreuses applications et fonctions sont touch\u00e9es,\ntoutes sont d\u00e9crites dans le bulletin \u003cspan class=\"textit\"\u003eApple\u003c/span\u003e\nr\u00e9f\u00e9renc\u00e9 dans la section \u00ab Documentation \u00bb.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OS X Lion",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5281 du 09 mai 2012",
"url": "https://support.apple.com/kb/HT5281"
}
]
}
CERTA-2012-AVI-524
Vulnerability from certfr_avis - Published: 2012-09-26 - Updated: 2012-09-26
De multiples vulnérabilités ont été corrigées dans Apple TV 5.1. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen d'images spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à Apple TV 5.1.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 Apple TV 5.1.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3048"
},
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2012-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3592"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2012-0683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0683"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3589"
},
{
"name": "CVE-2012-3722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3722"
},
{
"name": "CVE-2012-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0682"
},
{
"name": "CVE-2012-3590",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3590"
},
{
"name": "CVE-2012-3725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3725"
},
{
"name": "CVE-2012-3678",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3678"
},
{
"name": "CVE-2012-3726",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3726"
},
{
"name": "CVE-2011-3026",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3026"
},
{
"name": "CVE-2012-3591",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3591"
},
{
"name": "CVE-2012-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3679"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2011-4599",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4599"
}
],
"initial_release_date": "2012-09-26T00:00:00",
"last_revision_date": "2012-09-26T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-524",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple TV 5.1\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen d\u0027images\nsp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans AppleTV",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5504 du 24 septembre 2012",
"url": "http://support.apple.com/kb/HT5504"
}
]
}
CERTA-2012-AVI-358
Vulnerability from certfr_avis - Published: 2012-06-29 - Updated: 2012-06-29
Vingt-huit vulnérabilités ont été corrigées dans HP System Management Homepage. Ces vulnérabilités touchent les versions Linux et Windows du produit et peuvent mener à une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à HP System Management Homepage 7.1.1.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 HP System Management Homepage 7.1.1.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4415"
},
{
"name": "CVE-2012-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0053"
},
{
"name": "CVE-2011-4078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4078"
},
{
"name": "CVE-2012-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0021"
},
{
"name": "CVE-2011-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4619"
},
{
"name": "CVE-2012-2015",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2015"
},
{
"name": "CVE-2012-2012",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2012"
},
{
"name": "CVE-2011-4576",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4576"
},
{
"name": "CVE-2012-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0031"
},
{
"name": "CVE-2012-2013",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2013"
},
{
"name": "CVE-2012-1823",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1823"
},
{
"name": "CVE-2011-4577",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4577"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-4108",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4108"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-1165",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1165"
},
{
"name": "CVE-2011-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3607"
},
{
"name": "CVE-2012-2016",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2016"
},
{
"name": "CVE-2012-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0036"
},
{
"name": "CVE-2012-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0057"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4153"
},
{
"name": "CVE-2011-3379",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3379"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2012-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0830"
},
{
"name": "CVE-2012-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0027"
},
{
"name": "CVE-2012-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2014"
}
],
"initial_release_date": "2012-06-29T00:00:00",
"last_revision_date": "2012-06-29T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-358",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-06-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Vingt-huit vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eHP\nSystem Management Homepage\u003c/span\u003e. Ces vuln\u00e9rabilit\u00e9s touchent les\nversions \u003cspan class=\"textit\"\u003eLinux\u003c/span\u003e et \u003cspan\nclass=\"textit\"\u003eWindows\u003c/span\u003e du produit et peuvent mener \u00e0 une\nex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP System Management Homepage",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03360041 du 26 juin 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
}
]
}
CERTA-2012-AVI-514
Vulnerability from certfr_avis - Published: 2012-09-21 - Updated: 2012-09-21
De multiples vulnérabilités ont été corrigées dans IOS 6. Certaines d'entre elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à IOS 6.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 IOS 6.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3048",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3048"
},
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2011-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3089"
},
{
"name": "CVE-2011-3050",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3050"
},
{
"name": "CVE-2012-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3618"
},
{
"name": "CVE-2012-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3663"
},
{
"name": "CVE-2012-3746",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3746"
},
{
"name": "CVE-2012-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3651"
},
{
"name": "CVE-2011-3924",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3924"
},
{
"name": "CVE-2012-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3658"
},
{
"name": "CVE-2012-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3611"
},
{
"name": "CVE-2012-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3598"
},
{
"name": "CVE-2012-3638",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3638"
},
{
"name": "CVE-2012-1521",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1521"
},
{
"name": "CVE-2012-3745",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3745"
},
{
"name": "CVE-2012-3624",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3624"
},
{
"name": "CVE-2012-3664",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3664"
},
{
"name": "CVE-2012-1144",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1144"
},
{
"name": "CVE-2012-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3592"
},
{
"name": "CVE-2012-3741",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3741"
},
{
"name": "CVE-2011-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3068"
},
{
"name": "CVE-2012-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3652"
},
{
"name": "CVE-2012-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1127"
},
{
"name": "CVE-2012-1129",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1129"
},
{
"name": "CVE-2012-3674",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3674"
},
{
"name": "CVE-2011-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3090"
},
{
"name": "CVE-2012-3641",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3641"
},
{
"name": "CVE-2012-3696",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3696"
},
{
"name": "CVE-2012-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3626"
},
{
"name": "CVE-2011-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3069"
},
{
"name": "CVE-2012-1143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1143"
},
{
"name": "CVE-2012-3637",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3637"
},
{
"name": "CVE-2012-3680",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3680"
},
{
"name": "CVE-2012-3636",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3636"
},
{
"name": "CVE-2012-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3615"
},
{
"name": "CVE-2012-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3730"
},
{
"name": "CVE-2012-1131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1131"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3744"
},
{
"name": "CVE-2012-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3610"
},
{
"name": "CVE-2012-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3653"
},
{
"name": "CVE-2011-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3032"
},
{
"name": "CVE-2012-3667",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3667"
},
{
"name": "CVE-2012-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3608"
},
{
"name": "CVE-2012-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3617"
},
{
"name": "CVE-2012-3645",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3645"
},
{
"name": "CVE-2011-3064",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3064"
},
{
"name": "CVE-2012-1132",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1132"
},
{
"name": "CVE-2011-3021",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3021"
},
{
"name": "CVE-2012-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3738"
},
{
"name": "CVE-2012-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3640"
},
{
"name": "CVE-2012-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3733"
},
{
"name": "CVE-2011-3040",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3040"
},
{
"name": "CVE-2012-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3676"
},
{
"name": "CVE-2012-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3605"
},
{
"name": "CVE-2011-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3016"
},
{
"name": "CVE-2011-3969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3969"
},
{
"name": "CVE-2012-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3732"
},
{
"name": "CVE-2012-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3604"
},
{
"name": "CVE-2012-3686",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3686"
},
{
"name": "CVE-2012-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3635"
},
{
"name": "CVE-2012-3666",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3666"
},
{
"name": "CVE-2012-3740",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3740"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-1520",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1520"
},
{
"name": "CVE-2012-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3596"
},
{
"name": "CVE-2012-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3627"
},
{
"name": "CVE-2011-3966",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3966"
},
{
"name": "CVE-2012-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3602"
},
{
"name": "CVE-2011-3328",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3328"
},
{
"name": "CVE-2012-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1130"
},
{
"name": "CVE-2011-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3034"
},
{
"name": "CVE-2012-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3597"
},
{
"name": "CVE-2012-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3614"
},
{
"name": "CVE-2011-3043",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3043"
},
{
"name": "CVE-2011-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2845"
},
{
"name": "CVE-2011-3027",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3027"
},
{
"name": "CVE-2012-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3731"
},
{
"name": "CVE-2011-3926",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3926"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2012-3650",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3650"
},
{
"name": "CVE-2012-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3669"
},
{
"name": "CVE-2012-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3661"
},
{
"name": "CVE-2011-3060",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3060"
},
{
"name": "CVE-2011-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3105"
},
{
"name": "CVE-2011-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3968"
},
{
"name": "CVE-2012-0683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0683"
},
{
"name": "CVE-2012-3729",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3729"
},
{
"name": "CVE-2011-3053",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3053"
},
{
"name": "CVE-2011-3039",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3039"
},
{
"name": "CVE-2012-3734",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3734"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3589"
},
{
"name": "CVE-2012-3647",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3647"
},
{
"name": "CVE-2012-1128",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1128"
},
{
"name": "CVE-2012-3691",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3691"
},
{
"name": "CVE-2012-3684",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3684"
},
{
"name": "CVE-2012-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3634"
},
{
"name": "CVE-2012-3677",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3677"
},
{
"name": "CVE-2012-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3646"
},
{
"name": "CVE-2011-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3073"
},
{
"name": "CVE-2012-3724",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3724"
},
{
"name": "CVE-2011-3971",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3971"
},
{
"name": "CVE-2011-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3076"
},
{
"name": "CVE-2012-3671",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3671"
},
{
"name": "CVE-2012-1133",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1133"
},
{
"name": "CVE-2012-3603",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3603"
},
{
"name": "CVE-2012-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3695"
},
{
"name": "CVE-2012-1136",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1136"
},
{
"name": "CVE-2012-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3739"
},
{
"name": "CVE-2012-1134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1134"
},
{
"name": "CVE-2012-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1126"
},
{
"name": "CVE-2011-3042",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3042"
},
{
"name": "CVE-2012-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3655"
},
{
"name": "CVE-2012-1137",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1137"
},
{
"name": "CVE-2011-3059",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3059"
},
{
"name": "CVE-2011-3036",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3036"
},
{
"name": "CVE-2012-3722",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3722"
},
{
"name": "CVE-2012-3673",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3673"
},
{
"name": "CVE-2012-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3613"
},
{
"name": "CVE-2012-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0682"
},
{
"name": "CVE-2011-3041",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3041"
},
{
"name": "CVE-2011-3958",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3958"
},
{
"name": "CVE-2012-3590",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3590"
},
{
"name": "CVE-2012-3593",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3593"
},
{
"name": "CVE-2011-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3035"
},
{
"name": "CVE-2012-3725",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3725"
},
{
"name": "CVE-2012-3678",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3678"
},
{
"name": "CVE-2012-1140",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1140"
},
{
"name": "CVE-2012-1139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1139"
},
{
"name": "CVE-2011-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3074"
},
{
"name": "CVE-2012-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3659"
},
{
"name": "CVE-2012-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2815"
},
{
"name": "CVE-2012-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3594"
},
{
"name": "CVE-2011-3913",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3913"
},
{
"name": "CVE-2012-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3743"
},
{
"name": "CVE-2012-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3644"
},
{
"name": "CVE-2012-3726",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3726"
},
{
"name": "CVE-2012-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3633"
},
{
"name": "CVE-2012-3728",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3728"
},
{
"name": "CVE-2011-3026",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3026"
},
{
"name": "CVE-2012-3708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3708"
},
{
"name": "CVE-2012-3747",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3747"
},
{
"name": "CVE-2012-3742",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3742"
},
{
"name": "CVE-2012-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3642"
},
{
"name": "CVE-2012-3591",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3591"
},
{
"name": "CVE-2011-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3075"
},
{
"name": "CVE-2011-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3081"
},
{
"name": "CVE-2011-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3071"
},
{
"name": "CVE-2012-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3679"
},
{
"name": "CVE-2012-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3710"
},
{
"name": "CVE-2012-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3629"
},
{
"name": "CVE-2011-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3037"
},
{
"name": "CVE-2011-3457",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3457"
},
{
"name": "CVE-2012-3595",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3595"
},
{
"name": "CVE-2012-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3670"
},
{
"name": "CVE-2012-0680",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0680"
},
{
"name": "CVE-2012-3601",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3601"
},
{
"name": "CVE-2012-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3628"
},
{
"name": "CVE-2012-3681",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3681"
},
{
"name": "CVE-2011-3044",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3044"
},
{
"name": "CVE-2012-3631",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3631"
},
{
"name": "CVE-2012-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3665"
},
{
"name": "CVE-2012-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3612"
},
{
"name": "CVE-2012-1138",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1138"
},
{
"name": "CVE-2012-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3599"
},
{
"name": "CVE-2012-3704",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3704"
},
{
"name": "CVE-2012-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3625"
},
{
"name": "CVE-2012-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3683"
},
{
"name": "CVE-2011-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3078"
},
{
"name": "CVE-2012-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3736"
},
{
"name": "CVE-2012-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3672"
},
{
"name": "CVE-2012-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3609"
},
{
"name": "CVE-2012-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3660"
},
{
"name": "CVE-2012-3600",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3600"
},
{
"name": "CVE-2011-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3067"
},
{
"name": "CVE-2012-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1135"
},
{
"name": "CVE-2012-3706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3706"
},
{
"name": "CVE-2012-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3620"
},
{
"name": "CVE-2012-3727",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3727"
},
{
"name": "CVE-2012-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3737"
},
{
"name": "CVE-2012-3703",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3703"
},
{
"name": "CVE-2012-3648",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3648"
},
{
"name": "CVE-2012-1142",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1142"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3735"
},
{
"name": "CVE-2012-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3656"
},
{
"name": "CVE-2012-1141",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1141"
},
{
"name": "CVE-2011-3086",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3086"
},
{
"name": "CVE-2012-3630",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3630"
},
{
"name": "CVE-2012-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3693"
},
{
"name": "CVE-2012-3682",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3682"
},
{
"name": "CVE-2011-3038",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3038"
},
{
"name": "CVE-2012-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3639"
},
{
"name": "CVE-2011-4599",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4599"
},
{
"name": "CVE-2012-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2818"
},
{
"name": "CVE-2012-3668",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3668"
}
],
"initial_release_date": "2012-09-21T00:00:00",
"last_revision_date": "2012-09-21T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5503 :",
"url": "http://support.apple.com/kb/HT5503"
}
],
"reference": "CERTA-2012-AVI-514",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eIOS 6\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages Web\nsp\u00e9cialement con\u00e7ues.\n",
"title": "Multiples Vuln\u00e9rabilit\u00e9s dans IOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curi\u00e9 Apple HT5503 du 19 Septembre 2012",
"url": null
}
]
}
CERTA-2012-AVI-673
Vulnerability from certfr_avis - Published: 2012-11-22 - Updated: 2012-11-22
De multiples vulnérabilités ont été corrigées dans Oracle Solaris Libxml2. Elles permettent à un attaquant d'exécuter du code arbitraire à distance au moyen de pages Web spécialement conçues. Elles concernent le composant Libxml2.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris branche version 11.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun Solaris branche version 10.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun Solaris branche version 9.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
}
],
"initial_release_date": "2012-11-22T00:00:00",
"last_revision_date": "2012-11-22T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-673",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-11-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris Libxml2\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de pages Web\nsp\u00e9cialement con\u00e7ues. Elles concernent le composant \u003cspan\nclass=\"textit\"\u003eLibxml2\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris Libxml2",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 20 novembre 2012",
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_dos3"
}
]
}
CERTA-2011-AVI-528
Vulnerability from certfr_avis - Published: 2011-09-20 - Updated: 2011-09-20
De multiples vulnérabilités permettant une exécution de code arbitraire à distance ont été corrigées dans Google Chrome.
Description
De multiples vulnérabilités ont été corrigées dans la nouvelle version de Google Chrome. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Chrome versions antérieures à 14.0.835.163.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eGoogle Chrome versions ant\u00e9rieures \u00e0 14.0.835.163.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans la nouvelle version\nde Google Chrome. Leur exploitation permet, entre autres, l\u0027ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2838",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2838"
},
{
"name": "CVE-2011-2860",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2860"
},
{
"name": "CVE-2011-2841",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2841"
},
{
"name": "CVE-2011-2855",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2855"
},
{
"name": "CVE-2011-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2847"
},
{
"name": "CVE-2011-2840",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2840"
},
{
"name": "CVE-2011-2846",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2846"
},
{
"name": "CVE-2011-2851",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2851"
},
{
"name": "CVE-2011-2843",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2843"
},
{
"name": "CVE-2011-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2862"
},
{
"name": "CVE-2011-2844",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2844"
},
{
"name": "CVE-2011-2864",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2864"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2850",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2850"
},
{
"name": "CVE-2011-2852",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2852"
},
{
"name": "CVE-2011-2839",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2839"
},
{
"name": "CVE-2011-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2853"
},
{
"name": "CVE-2011-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2857"
},
{
"name": "CVE-2011-2861",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2861"
},
{
"name": "CVE-2011-2875",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2875"
},
{
"name": "CVE-2011-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3234"
},
{
"name": "CVE-2011-2835",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2835"
},
{
"name": "CVE-2011-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2854"
},
{
"name": "CVE-2011-2842",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2842"
},
{
"name": "CVE-2011-2837",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2837"
},
{
"name": "CVE-2011-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2874"
},
{
"name": "CVE-2011-2859",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2859"
},
{
"name": "CVE-2011-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2849"
},
{
"name": "CVE-2011-2848",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2848"
},
{
"name": "CVE-2011-2858",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2858"
},
{
"name": "CVE-2011-2856",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2856"
},
{
"name": "CVE-2011-2836",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2836"
}
],
"initial_release_date": "2011-09-20T00:00:00",
"last_revision_date": "2011-09-20T00:00:00",
"links": [
{
"title": "Note de version Google Chrome 2011/09/stable-channel-update_16.html du 16 septembre 2011 :",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
}
],
"reference": "CERTA-2011-AVI-528",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-09-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s permettant une ex\u00e9cution de code arbitraire\n\u00e0 distance ont \u00e9t\u00e9 corrig\u00e9es dans Google Chrome.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Notes de versions de Google Chrome du 16 septembre 2011",
"url": null
}
]
}
CERTFR-2014-AVI-480
Vulnerability from certfr_avis - Published: 2014-11-13 - Updated: 2014-11-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPOS versions antérieures à 6.6R2 | ||
| ESET | Security | Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2 | ||
| Juniper Networks | N/A | CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6 | ||
| Juniper Networks | Junos Space | Junos Space jusqu'à la version 13.3 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2 | ||
| ESET | Security | Network and Security Manager (NSM) version 2012.2 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 6.6R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space jusqu\u0027\u00e0 la version 13.3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Network and Security Manager (NSM) version 2012.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3158",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3158"
},
{
"name": "CVE-2010-3853",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3853"
},
{
"name": "CVE-2014-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
},
{
"name": "CVE-2010-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
},
{
"name": "CVE-2012-0789",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0789"
},
{
"name": "CVE-2012-2329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2329"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2011-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2012-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0781"
},
{
"name": "CVE-2014-4827",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4827"
},
{
"name": "CVE-2013-1635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2013-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
},
{
"name": "CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2012-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0788"
},
{
"name": "CVE-2010-4755",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4755"
},
{
"name": "CVE-2013-1775",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1775"
},
{
"name": "CVE-2009-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2009-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2013-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
},
{
"name": "CVE-2013-0791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0791"
},
{
"name": "CVE-2010-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2014-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
},
{
"name": "CVE-2011-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0010"
},
{
"name": "CVE-2011-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1398"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2014-4825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4825"
},
{
"name": "CVE-2010-4707",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4707"
},
{
"name": "CVE-2012-0882",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0882"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2010-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
},
{
"name": "CVE-2010-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0426"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2012-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2311"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4830",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4830"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2014-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2532"
},
{
"name": "CVE-2014-4828",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4828"
},
{
"name": "CVE-2014-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0095"
},
{
"name": "CVE-2010-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0427"
},
{
"name": "CVE-2014-3470",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3470"
},
{
"name": "CVE-2014-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3062"
},
{
"name": "CVE-2012-0831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0831"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2012-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0057"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2010-2956",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2956"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2014-4833",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4833"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2014-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0837"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
},
{
"name": "CVE-2012-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1172"
},
{
"name": "CVE-2014-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
},
{
"name": "CVE-2010-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1163"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2010-5107",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5107"
},
{
"name": "CVE-2009-1265",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1265"
},
{
"name": "CVE-2010-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3316"
},
{
"name": "CVE-2012-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3510"
},
{
"name": "CVE-2011-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5000"
},
{
"name": "CVE-2010-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3435"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-2337",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2337"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2014-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
},
{
"name": "CVE-2014-3091",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3091"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
}
],
"initial_release_date": "2014-11-13T00:00:00",
"last_revision_date": "2014-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-480",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10661 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10657 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10657"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10658 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10658"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10660 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10660"
}
]
}
CERTA-2012-AVI-237
Vulnerability from certfr_avis - Published: 2012-04-27 - Updated: 2012-04-27
De multiples vulnérabilités ont été corrigées dans VMware. Les vulnérabilités affectent principalement les bibliothèques XML. Leur exploitation peut provoquer une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3191"
},
{
"name": "CVE-2011-4348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4348"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2012-0028",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0028"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
}
],
"initial_release_date": "2012-04-27T00:00:00",
"last_revision_date": "2012-04-27T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2012-0008 du 26 avril 2012 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2012-0008.html"
}
],
"reference": "CERTA-2012-AVI-237",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Les vuln\u00e9rabilit\u00e9s affectent\nprincipalement les biblioth\u00e8ques XML. Leur exploitation peut provoquer\nune ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMSA-2012-0008",
"url": null
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: 2022-03-23 - Updated: 2022-03-23
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
VAR-201109-0190
Vulnerability from variot - Updated: 2025-12-22 22:37Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. libxml2 Is XPath There is a flaw in memory double release due to incomplete processing.Service disruption by a third party (DoS) May result in a condition or other unclear effects. Google Chrome is a web browser developed by Google (Google). The login process recorded sensitive information in the system log, where other users of the system could read it. The sensitive information may persist in saved logs after installation of this update. See http://support.apple.com/kb/TS4272 for more information on how to securely remove any remaining records. This issue only affects systems running OS X Lion v10.7.3 with users of Legacy File Vault and/or networked home directories. CVE-ID CVE-2012-0652 : Terry Reeves and Tim Winningham of the Ohio State University, Markus 'Jaroneko' Raty of the Finnish Academy of Fine Arts, Jaakko Pero of Aalto University, Mark Cohen of Oregon State University, Paul Nelson
Bluetooth Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A local user may be able to execute arbitrary code with system privileges Description: A temporary file race condition issue existed in blued's initialization routine. CVE-ID CVE-2012-0649 : Aaron Sigel of vtty.com
curl Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. curl disabled the 'empty fragment' countermeasure which prevented these attacks. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0036
Directory Service Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: A remote attacker may obtain sensitive information Description: Multiple issues existed in the directory server's handling of messages from the network. By sending a maliciously crafted message, a remote attacker could cause the directory server to disclose memory from its address space, potentially revealing account credentials or other sensitive information. This issue does not affect OS X Lion systems. The Directory Server is disabled by default in non-server installations of OS X. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies
ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: Multiple vulnerabilities in libpng Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to information disclosure. CVE-ID CVE-2011-1167
Kernel Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: When FileVault is used, the disk may contain unencrypted user data Description: An issue in the kernel's handling of the sleep image used for hibernation left some data unencrypted on disk even when FileVault was enabled. This issue is addressed through improved handling of the sleep image, and by overwriting the existing sleep image when updating to OS X v10.7.4. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0654 : Dirk-Willem van Gulik of WebWeaving.org, Guilherme Prado of Conselho da Justica Federal, Ryan Sleevi of Google
libsecurity Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Support for X.509 certificates with insecure-length RSA keys may expose users to spoofing and information disclosure Description: Certificates signed using RSA keys with insecure key lengths were accepted by libsecurity. This issue is addressed by rejecting certificates containing RSA keys less than 1024 bits. This issue does not affect systems prior to OS X Lion. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2011-4566 CVE-2011-4885 CVE-2012-0830
Quartz Composer Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A user with physical access to the computer may be able to cause Safari to launch if the screen is locked and the RSS Visualizer screen saver is used Description: An access control issue existed in Quartz Composer's handling of screen savers. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0661 : Damian Put working with HP's Zero Day Initiative
Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Multiple vulnerabilities in Ruby Description: Ruby is updated to 1.8.7-p357 to address multiple vulnerabilities. By sending a maliciously crafted packet, an unauthenticated remote attacker could cause a denial of service or arbitrary code execution with system privileges. These issues do not affect OS X Lion systems. Processing untrusted input with the Security framework could result in memory corruption. This issue does not affect 32-bit processes. CVE-ID CVE-2012-0662 : aazubel working with HP's Zero Day Initiative
Time Machine Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A remote attacker may access a user's Time Machine backup credentials Description: The user may designate a Time Capsule or remote AFP volume attached to an AirPort Base Station to be used for Time Machine backups. Beginning with AirPort Base Station and Time Capsule Firmware Update 7.6, Time Capsules and Base Stations support a secure SRP-based authentication mechanism over AFP. However, Time Machine did not require that the SRP-based authentication mechanism was used for subsequent backup operations, even if Time Machine was initially configured or had ever contacted a Time Capsule or Base Station that supported it. CVE-ID CVE-2012-0675 : Renaud Deraison of Tenable Network Security, Inc. CVE-ID CVE-2011-2895 : Tomas Hoger of Red Hat
Note: Additionally, this update filters dynamic linker environment variables from a customized environment property list in the user's home directory, if present. Only one is needed, either Security Update 2012-002 or OS X v10.7.4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03360041
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03360041 Version: 1
HPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on Linux and Windows, Remote Unauthorized Access, Disclosure of Information, Data Modification, Denial of Service (DoS), Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-06-26 Last Updated: 2012-06-26
Potential Security Impact: Remote unauthorized access, disclosure of information, data modification, Denial of Service (DoS), execution of arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows.
References: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379, CVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317, CVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885, CVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053, CVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823, CVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS), CVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege Elevation), CVE-2012-2016 (Information disclosure), SSRT100336, SSRT100753, SSRT100669, SSRT100676, SSRT100695, SSRT100714, SSRT100760, SSRT100786, SSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP System Management Homepage (SMH) before v7.1.1 running on Linux and Windows.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-2012 (AV:N/AC:L/Au:N/C:C/I:C/A:P) 9.7 CVE-2012-2013 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2012-2014 (AV:N/AC:M/Au:S/C:N/I:N/A:N) 6.8 CVE-2012-2015 (AV:N/AC:M/Au:S/C:P/I:N/A:N) 6.5 CVE-2012-2016 (AV:L/AC:M/Au:S/C:C/I:N/A:N) 4.4 CVE-2011-1944 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3 CVE-2011-2821 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-2834 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-3379 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4 CVE-2011-4078 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4108 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2011-4415 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2 CVE-2011-4576 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-4577 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-4619 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-4885 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0021 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 2.6 CVE-2012-0027 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6 CVE-2012-0036 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0053 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2012-0057 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-1165 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP System Management Homepage v7.1.1 or subsequent to resolve the vulnerabilities. HP System Management Homepage v7.1.1 is available here:
HP System Management Homepage for Windows x64
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab 0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Windows x86
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7 c0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Linux (AMD64/EM64T)
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18 d373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HP System Management Homepage for Linux (x86)
[Download here] or enter the following URL into the browser address window.
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail s/?sp4ts.oid=4091409&spf_p.tpst=psiSwdMain&spf_p.prp_psiSwdMain=wsrp-navigati onalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa meId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e 8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument&javax.p ortlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vign ette.cachetoken
HISTORY Version:1 (rev.1) 26 June 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
CVE-2011-2821: A memory corruption (double free) bug has been identified in libxml2's XPath engine. This vulnerability does not affect the oldstable distribution (lenny).
For the oldstable distribution (lenny), this problem has been fixed in version 2.6.32.dfsg-5+lenny5.
For the stable distribution (squeeze), this problem has been fixed in version 2.7.8.dfsg-2+squeeze2.
For the testing distribution (wheezy), this problem has been fixed in version 2.7.8.dfsg-7.
For the unstable distribution (sid), this problem has been fixed in version 2.7.8.dfsg-7. Summary
VMware ESX updates to ESX Service Console. Problem Description
a. ESX third party update for Service Console kernel
The ESX Service Console Operating System (COS) kernel is updated
which addresses several security issues in the COS kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2011-3191, CVE-2011-4348 and CVE-2012-0028 to
these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201204401-SG
ESX 4.0 ESX patch pending **
ESX 3.5 ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion. See VMSA-2012-0006 for details.
b.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944,
CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201204402-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion. Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
ESX 4.1
ESX410-201204001 md5sum: 7994635547b375b51422b1a166c6e214 sha1sum: 9d5f3c9cbc53a9e03524b9bf0935c71f3dadf620 http://kb.vmware.com/kb/2013057
ESX410-201204001 contains ESX410-201204401-SG and ESX410-201204402-SG
- Change log
2012-04-26 VMSA-2012-0008 Initial security advisory in conjunction with the release of patches for ESX 4.1 on 2012-04-26. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2012 VMware Inc. All rights reserved. Summary:
Updated libxml2 packages that fix several security issues are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
- Description:
The libxml2 library is a development toolbox providing the implementation of various XML standards. One of those standards is the XML Path Language (XPath), which is a language for addressing parts of an XML document.
A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-3919)
An off-by-one error, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XML files. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0216)
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially-crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash or, possibly, execute arbitrary code. (CVE-2011-1944)
Flaws were found in the way libxml2 parsed certain XPath expressions. If an attacker were able to supply a specially-crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2011-2834)
An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905)
Note: Red Hat does not ship any applications that use libxml2 in a way that would allow the CVE-2011-1944, CVE-2010-4008, and CVE-2011-2834 flaws to be exploited; however, third-party applications may allow XPath expressions to be passed which could trigger these flaws. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008.
All users of libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
645341 - CVE-2010-4008 libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis 709747 - CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets 724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding 735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT 767387 - CVE-2011-3905 libxml2 out of bounds read 771896 - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm
i386: libxml2-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.i386.rpm
x86_64: libxml2-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm
i386: libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm
x86_64: libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm
i386: libxml2-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.i386.rpm
ia64: libxml2-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-2.6.26-2.1.12.el5_7.2.ia64.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ia64.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.ia64.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.ia64.rpm
ppc: libxml2-2.6.26-2.1.12.el5_7.2.ppc.rpm libxml2-2.6.26-2.1.12.el5_7.2.ppc64.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ppc.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ppc64.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.ppc.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.ppc64.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.ppc.rpm
s390x: libxml2-2.6.26-2.1.12.el5_7.2.s390.rpm libxml2-2.6.26-2.1.12.el5_7.2.s390x.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.s390.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.s390x.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.s390.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.s390x.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.s390x.rpm
x86_64: libxml2-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm libxml2-devel-2.6.26-2.1.12.el5_7.2.x86_64.rpm libxml2-python-2.6.26-2.1.12.el5_7.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2010-4008.html https://www.redhat.com/security/data/cve/CVE-2011-0216.html https://www.redhat.com/security/data/cve/CVE-2011-1944.html https://www.redhat.com/security/data/cve/CVE-2011-2834.html https://www.redhat.com/security/data/cve/CVE-2011-3905.html https://www.redhat.com/security/data/cve/CVE-2011-3919.html https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-09-19-1 iOS 6
iOS 6 is now available and addresses the following:
CFNetwork Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. CFNetwork may send requests to an incorrect hostname, resulting in the disclosure of sensitive information. This issue was addressed through improvements to URL handling. CVE-ID CVE-2012-3724 : Erling Ellingsen of Facebook
CoreGraphics Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Multiple vulnerabilities in FreeType Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues were addressed by updating FreeType to version 2.4.9. Further information is available via the FreeType site at http://www.freetype.org/ CVE-ID CVE-2012-1126 CVE-2012-1127 CVE-2012-1128 CVE-2012-1129 CVE-2012-1130 CVE-2012-1131 CVE-2012-1132 CVE-2012-1133 CVE-2012-1134 CVE-2012-1135 CVE-2012-1136 CVE-2012-1137 CVE-2012-1138 CVE-2012-1139 CVE-2012-1140 CVE-2012-1141 CVE-2012-1142 CVE-2012-1143 CVE-2012-1144
CoreMedia Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access existed in the handling of Sorenson encoded movie files. This issue was addressed through improved memory initialization. CVE-ID CVE-2012-3722 : Will Dormann of the CERT/CC
DHCP Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A malicious Wi-Fi network may be able to determine networks a device has previously accessed Description: Upon connecting to a Wi-Fi network, iOS may broadcast MAC addresses of previously accessed networks per the DNAv4 protocol. This issue was addressed by disabling DNAv4 on unencrypted Wi-Fi networks. CVE-ID CVE-2012-3725 : Mark Wuergler of Immunity, Inc.
ImageIO Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of ThunderScan encoded TIFF images. This issue was addressed by updating libtiff to version 3.9.5. CVE-ID CVE-2011-1167
ImageIO Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted PNG image may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libpng's handling of PNG images. These issues were addressed through improved validation of PNG images. CVE-ID CVE-2011-3026 : Juri Aedla CVE-2011-3048 CVE-2011-3328
ImageIO Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted JPEG image may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in ImageIO's handling of JPEG images. This issue was addressed through improved memory management. CVE-ID CVE-2012-3726 : Phil of PKJE Consulting
ImageIO Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow issue existed in libTIFF's handling of TIFF images. This issue was addressed through improved validation of TIFF images. CVE-ID CVE-2012-1173 : Alexander Gavrun working with HP's Zero Day Initiative
International Components for Unicode Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Applications that use ICU may be vulnerable to an unexpected application termination or arbitrary code execution Description: A stack buffer overflow existed in the handling of ICU locale IDs. This issue was addressed through improved bounds checking. CVE-ID CVE-2011-4599
IPSec Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Loading a maliciously crafted racoon configuration file may lead to arbitrary code execution Description: A buffer overflow existed in the handling of racoon configuration files. This issue was addressed through improved bounds checking. CVE-ID CVE-2012-3727 : iOS Jailbreak Dream Team
Kernel Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: An invalid pointer dereference issue existed in the kernel's handling of packet filter ioctls. This may allow an attacker to alter kernel memory. This issue was addressed through improved error handling. CVE-ID CVE-2012-3728 : iOS Jailbreak Dream Team
Kernel Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to determine kernel memory layout Description: An uninitialized memory access issue existed in the Berkeley Packet Filter interpreter, which led to the disclosure of memory content. This issue was addressed through improved memory initialization. CVE-ID CVE-2012-3729 : Dan Rosenberg
libxml Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple vulnerabilities existed in libxml, the most serious of which may lead to an unexpected application termination or arbitrary code execution. These issues were addressed by applying the relevant upstream patches. CVE-ID CVE-2011-1944 : Chris Evans of Google Chrome Security Team CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-3919 : Juri Aedla
Mail Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Mail may present the wrong attachment in a message Description: A logic issue existed in Mail's handling of attachments. If a subsequent mail attachment used the same Content-ID as a previous one, the previous attachment would be displayed, even in the case where the 2 mails originated from different senders. This could facilitate some spoofing or phishing attacks. This issue was addressed through improved handling of attachments. CVE-ID CVE-2012-3730 : Angelo Prado of the salesforce.com Product Security Team
Mail Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Email attachments may be read without user's passcode Description: A logic issue existed in Mail's use of Data Protection on email attachments. This issue was addressed by properly setting the Data Protection class for email attachments. CVE-ID CVE-2012-3731 : Stephen Prairie of Travelers Insurance, Erich Stuntebeck of AirWatch
Mail Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: An attacker may spoof the sender of a S/MIME signed message Description: S/MIME signed messages displayed the untrusted 'From' address, instead of the name associated with the message signer's identity. This issue was addressed by displaying the address associated with the message signer's identity when it is available. CVE-ID CVE-2012-3732 : An anonymous researcher
Messages Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A user may unintentionally disclose the existence of their email addresses Description: When a user had multiple email addresses associated with iMessage, replying to a message may have resulted in the reply being sent from a different email address. This may disclose another email address associated to the user's account. This issue was addressed by always replying from the email address the original message was sent to. CVE-ID CVE-2012-3733 : Rodney S. Foley of Gnomesoft, LLC
Office Viewer Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Unencrypted document data may be written to a temporary file Description: An information disclosure issue existed in the support for viewing Microsoft Office files. When viewing a document, the Office Viewer would write a temporary file containing data from the viewed document to the temporary directory of the invoking process. For an application that uses data protection or other encryption to protect the user's files, this could lead to information disclosure. This issue was addressed by avoiding creation of temporary files when viewing Office documents. CVE-ID CVE-2012-3734 : Salvatore Cataudella of Open Systems Technologies
OpenGL Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Applications that use OS X's OpenGL implementation may be vulnerable to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the handling of GLSL compilation. These issues were addressed through improved validation of GLSL shaders. CVE-ID CVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and Marc Schoenefeld of the Red Hat Security Response Team
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to the device could briefly view the last used third-party app on a locked device Description: A logic issue existed with the display of the "Slide to Power Off" slider on the lock screen. This issue was addressed through improved lock state management. CVE-ID CVE-2012-3735 : Chris Lawrence DBB
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to bypass the screen lock Description: A logic issue existed in the termination of FaceTime calls from the lock screen. This issue was addressed through improved lock state management. CVE-ID CVE-2012-3736 : Ian Vitek of 2Secure AB
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: All photos may be accessible at the lock screen Description: A design issue existed in the support for viewing photos that were taken at the lock screen. In order to determine which photos to permit access to, the passcode lock consulted the time at which the device was locked and compared it to the time that a photo was taken. By spoofing the current time, an attacker could gain access to photos that were taken before the device was locked. This issues was addressed by explicitly keeping track of the photos that were taken while the device was locked. CVE-ID CVE-2012-3737 : Ade Barkah of BlueWax Inc.
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to a locked device may perform FaceTime calls Description: A logic issue existed in the Emergency Dialer screen, which permitted FaceTime calls via Voice Dialing on the locked device. This could also disclose the user's contacts via contact suggestions. This issue was addressed by disabling Voice Dialing on the Emergency Dialer screen. CVE-ID CVE-2012-3738 : Ade Barkah of BlueWax Inc.
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to bypass the screen lock Description: Using the camera from the screen lock could in some cases interfere with automatic lock functionality, allowing a person with physical access to the device to bypass the Passcode Lock screen. This issue was addressed through improved lock state management. CVE-ID CVE-2012-3739 : Sebastian Spanninger of the Austrian Federal Computing Centre (BRZ)
Passcode Lock Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to bypass the screen lock Description: A state management issue existed in the handling of the screen lock. This issue was addressed through improved lock state management. CVE-ID CVE-2012-3740 : Ian Vitek of 2Secure AB
Restrictions Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A user may be able to make purchases without entering Apple ID credentials Description: After disabling Restrictions, iOS may not ask for the user's password during a transaction. This issue was addressed by additional enforcement of purchase authorization. CVE-ID CVE-2012-3741 : Kevin Makens of Redwood High School
Safari Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Websites may use characters with an appearance similar to the lock icon in their titles Description: Websites could use a Unicode character to create a lock icon in the page title. This icon was similar in appearance to the icon used to indicate a secure connection, and could have lead the user to believe a secure connection had been established. This issue was addressed by removing these characters from page titles. CVE-ID CVE-2012-3742 : Boku Kihara of Lepidum
Safari Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Passwords may autocomplete even when the site specifies that autocomplete should be disabled Description: Password input elements with the autocomplete attribute set to "off" were being autocompleted. This issue was addressed through improved handling of the autocomplete attribute. CVE-ID CVE-2012-0680 : Dan Poltawski of Moodle
System Logs Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Sandboxed apps may obtain system log content Description: Sandboxed apps had read access to /var/log directory, which may allow them to obtain sensitive information contained in system logs. This issue was addressed by denying sandboxed apps access to the /var/log directory. CVE-ID CVE-2012-3743
Telephony Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: An SMS message may appear to have been sent by an arbitrary user Description: Messages displayed the return address of an SMS message as the sender. Return addresses may be spoofed. This issue was addressed by always displaying the originating address instead of the return address. CVE-ID CVE-2012-3744 : pod2g
Telephony Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: An SMS message may disrupt cellular connectivity Description: An off-by-one buffer overflow existed in the handling of SMS user data headers. This issue was addressed through improved bounds checking. CVE-ID CVE-2012-3745 : pod2g
UIKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: An attacker that gains access to a device's filesystem may be able to read files that were being displayed in a UIWebView Description: Applications that use UIWebView may leave unencrypted files on the file system even when a passcode is enabled. This issue was addressed through improved use of data protection. CVE-ID CVE-2012-3746 : Ben Smith of Box
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2011-3016 : miaubiz CVE-2011-3021 : Arthur Gerkis CVE-2011-3027 : miaubiz CVE-2011-3032 : Arthur Gerkis CVE-2011-3034 : Arthur Gerkis CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis CVE-2011-3036 : miaubiz CVE-2011-3037 : miaubiz CVE-2011-3038 : miaubiz CVE-2011-3039 : miaubiz CVE-2011-3040 : miaubiz CVE-2011-3041 : miaubiz CVE-2011-3042 : miaubiz CVE-2011-3043 : miaubiz CVE-2011-3044 : Arthur Gerkis CVE-2011-3050 : miaubiz CVE-2011-3053 : miaubiz CVE-2011-3059 : Arthur Gerkis CVE-2011-3060 : miaubiz CVE-2011-3064 : Atte Kettunen of OUSPG CVE-2011-3068 : miaubiz CVE-2011-3069 : miaubiz CVE-2011-3071 : pa_kt working with HP's Zero Day Initiative CVE-2011-3073 : Arthur Gerkis CVE-2011-3074 : Slawomir Blazek CVE-2011-3075 : miaubiz CVE-2011-3076 : miaubiz CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team CVE-2011-3081 : miaubiz CVE-2011-3086 : Arthur Gerkis CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz CVE-2011-3090 : Arthur Gerkis CVE-2011-3105 : miaubiz CVE-2011-3913 : Arthur Gerkis CVE-2011-3924 : Arthur Gerkis CVE-2011-3926 : Arthur Gerkis CVE-2011-3958 : miaubiz CVE-2011-3966 : Aki Helin of OUSPG CVE-2011-3968 : Arthur Gerkis CVE-2011-3969 : Arthur Gerkis CVE-2011-3971 : Arthur Gerkis CVE-2012-0682 : Apple Product Security CVE-2012-0683 : Dave Mandelin of Mozilla CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP CVE-2012-2818 : miaubiz CVE-2012-3589 : Dave Mandelin of Mozilla CVE-2012-3590 : Apple Product Security CVE-2012-3591 : Apple Product Security CVE-2012-3592 : Apple Product Security CVE-2012-3593 : Apple Product Security CVE-2012-3594 : miaubiz CVE-2012-3595 : Martin Barbella of Google Chrome Security CVE-2012-3596 : Skylined of the Google Chrome Security Team CVE-2012-3597 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3598 : Apple Product Security CVE-2012-3599 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3600 : David Levin of the Chromium development community CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer CVE-2012-3602 : miaubiz CVE-2012-3603 : Apple Product Security CVE-2012-3604 : Skylined of the Google Chrome Security Team CVE-2012-3605 : Cris Neckar of the Google Chrome Security team CVE-2012-3608 : Skylined of the Google Chrome Security Team CVE-2012-3609 : Skylined of the Google Chrome Security Team CVE-2012-3610 : Skylined of the Google Chrome Security Team CVE-2012-3611 : Apple Product Security CVE-2012-3612 : Skylined of the Google Chrome Security Team CVE-2012-3613 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3614 : Yong Li of Research In Motion, Inc. CVE-2012-3615 : Stephen Chenney of the Chromium development community CVE-2012-3617 : Apple Product Security CVE-2012-3618 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3620 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3624 : Skylined of the Google Chrome Security Team CVE-2012-3625 : Skylined of Google Chrome Security Team CVE-2012-3626 : Apple Product Security CVE-2012-3627 : Skylined and Abhishek Arya (Inferno) of Google Chrome Security team CVE-2012-3628 : Apple Product Security CVE-2012-3629 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3630 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3631 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3640 : miaubiz CVE-2012-3641 : Slawomir Blazek CVE-2012-3642 : miaubiz CVE-2012-3644 : miaubiz CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3647 : Skylined of the Google Chrome Security Team CVE-2012-3648 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3651 : Abhishek Arya (Inferno) and Martin Barbella of the Google Chrome Security Team CVE-2012-3652 : Martin Barbella of Google Chrome Security Team CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3655 : Skylined of the Google Chrome Security Team CVE-2012-3656 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3658 : Apple CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3660 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3661 : Apple Product Security CVE-2012-3663 : Skylined of Google Chrome Security Team CVE-2012-3664 : Thomas Sepez of the Chromium development community CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer CVE-2012-3666 : Apple CVE-2012-3667 : Trevor Squires of propaneapp.com CVE-2012-3668 : Apple Product Security CVE-2012-3669 : Apple Product Security CVE-2012-3670 : Abhishek Arya (Inferno) of the Google Chrome Security Team, Arthur Gerkis CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team CVE-2012-3672 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3673 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3674 : Skylined of Google Chrome Security Team CVE-2012-3676 : Julien Chaffraix of the Chromium development community CVE-2012-3677 : Apple CVE-2012-3678 : Apple Product Security CVE-2012-3679 : Chris Leary of Mozilla CVE-2012-3680 : Skylined of Google Chrome Security Team CVE-2012-3681 : Apple CVE-2012-3682 : Adam Barth of the Google Chrome Security Team CVE-2012-3683 : wushi of team509 working with iDefense VCP CVE-2012-3684 : kuzzcc CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing) CVE-2012-3703 : Apple Product Security CVE-2012-3704 : Skylined of the Google Chrome Security Team CVE-2012-3706 : Apple Product Security CVE-2012-3708 : Apple CVE-2012-3710 : James Robinson of Google CVE-2012-3747 : David Bloom of Cue
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to a cross- site disclosure of information Description: A cross-origin issue existed in the handling of CSS property values. This issue was addressed through improved origin tracking. CVE-ID CVE-2012-3691 : Apple
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: A malicious website may be able to replace the contents of an iframe on another site Description: A cross-origin issue existed in the handling of iframes in popup windows. This issue was addressed through improved origin tracking. CVE-ID CVE-2011-3067 : Sergey Glazunov
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to a cross- site disclosure of information Description: A cross-origin issue existed in the handling of iframes and fragment identifiers. This issue was addressed through improved origin tracking. CVE-ID CVE-2012-2815 : Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, and Dan Boneh of the Stanford University Security Laboratory
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Look-alike characters in a URL could be used to masquerade a website Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could have been used to create a URL which contains look-alike characters. These could have been used in a malicious website to direct the user to a spoofed site that visually appears to be a legitimate domain. This issue was addressed by supplementing WebKit's list of known look-alike characters. Look- alike characters are rendered in Punycode in the address bar. CVE-ID CVE-2012-3693 : Matt Cooley of Symantec
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A canonicalization issue existed in the handling of URLs. This may have led to cross-site scripting on sites which use the location.href property. This issue was addressed through improved canonicalization of URLs. CVE-ID CVE-2012-3695 : Masato Kinugawa
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to HTTP request splitting Description: An HTTP header injection issue existed in the handling of WebSockets. This issue was addressed through improved WebSockets URI sanitization. CVE-ID CVE-2012-3696 : David Belcher of the BlackBerry Security Incident Response Team
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A maliciously crafted website may be able to spoof the value in the URL bar Description: A state management issue existed in the handling of session history. Navigations to a fragment on the current page may cause Safari to display incorrect information in the URL bar. This issue was addressed through improved session state tracking. CVE-ID CVE-2011-2845 : Jordi Chancel
WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to the disclosure of the disclosure of memory contents Description: An uninitialized memory access issue existed in the handling of SVG images. This issue was addressed through improved memory initialization. CVE-ID CVE-2012-3650 : Apple
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "6.0".
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJQWeYHAAoJEPefwLHPlZEwFlwP/1Ib/2m8K7orlPb3zmsKTyjo 3T0rFqu1LbXNzwLRhan7E7KiJoQ7U6yVO4045o/19AYZM+zGVNnHsCkUc3+Vcpa5 TZIM9Rik2iXKMxzttFfc5tvhE1u18PstsDLU/jvyW+s3XxMVL54wnSmW1R+P0de0 8+Q++IANogUj+scJzQkTaFDNDN5v1p0BT0+cifCcqktXB4H/PoaQ7drIWiDGYB/9 n4IL5AjM0BJBzWkldfjPimZ0BseSA0BxdeVCopmAgdnigyB60G4cWGzkU7E35VnP dWgdU9rnIIvGGe/vP912f7AoPtWs1b8n6DYCJgGRXvaRfPoHFUlXaRoVB6vJlMVs JXyMrw/RSDfYEgJdNbFOSxyJXHUkTkt4+aNW4KcoMR6raI/W5zKDyMEICw1wpkwP id6Dz4e6ncf+cfvAFqXpk02OC7iJqn71IJN2MvU/hC7797l++PINIoOHwJZolt+T xL3wV8p3Lk8K6lZx3Q9Tu6Dd7GYkxtjLCgV1NgdHOwPKDUOJ47oG6RjZAd6hpicp RqYXbk5bJpd3nZv+X6FrCZqGfeuwREWW7FJ0dI+/8ohlnisTz16f48W9FtuN3HIj bmxFJ46P4LGxrizwDSdBngxf3Utkh+7hGLuMH51/jR8+tCqDIEgpKBA+2F+IOmyP XtT4lS60xKz63YSg79dd =LvMt -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-01
http://security.gentoo.org/
Severity: High Title: Chromium, V8: Multiple vulnerabilities Date: November 01, 2011 Bugs: #351525, #353626, #354121, #356933, #357963, #358581, #360399, #363629, #365125, #366335, #367013, #368649, #370481, #373451, #373469, #377475, #377629, #380311, #380897, #381713, #383251, #385649, #388461 ID: 201111-01
Synopsis
Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code and local root privilege escalation.
Background
Chromium is an open-source web browser project. V8 is Google's open source JavaScript engine.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 15.0.874.102 >= 15.0.874.102 2 dev-lang/v8 < 3.5.10.22 >= 3.5.10.22 ------------------------------------------------------------------- 2 affected packages -------------------------------------------------------------------
Description
Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details.
Impact
A local attacker could gain root privileges (CVE-2011-1444, fixed in chromium-11.0.696.57). The attacker also could obtain cookies and other sensitive information, conduct man-in-the-middle attacks, perform address bar spoofing, bypass the same origin policy, perform Cross-Site Scripting attacks, or bypass pop-up blocks.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-15.0.874.102"
All V8 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/v8-3.5.10.22"
References
[ 1 ] CVE-2011-2345 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345 [ 2 ] CVE-2011-2346 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346 [ 3 ] CVE-2011-2347 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347 [ 4 ] CVE-2011-2348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348 [ 5 ] CVE-2011-2349 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349 [ 6 ] CVE-2011-2350 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350 [ 7 ] CVE-2011-2351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351 [ 8 ] CVE-2011-2834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834 [ 9 ] CVE-2011-2835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835 [ 10 ] CVE-2011-2837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837 [ 11 ] CVE-2011-2838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838 [ 12 ] CVE-2011-2839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839 [ 13 ] CVE-2011-2840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840 [ 14 ] CVE-2011-2841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841 [ 15 ] CVE-2011-2843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843 [ 16 ] CVE-2011-2844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844 [ 17 ] CVE-2011-2845 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845 [ 18 ] CVE-2011-2846 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846 [ 19 ] CVE-2011-2847 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847 [ 20 ] CVE-2011-2848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848 [ 21 ] CVE-2011-2849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849 [ 22 ] CVE-2011-2850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850 [ 23 ] CVE-2011-2851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851 [ 24 ] CVE-2011-2852 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852 [ 25 ] CVE-2011-2853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853 [ 26 ] CVE-2011-2854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854 [ 27 ] CVE-2011-2855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855 [ 28 ] CVE-2011-2856 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856 [ 29 ] CVE-2011-2857 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857 [ 30 ] CVE-2011-2858 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858 [ 31 ] CVE-2011-2859 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859 [ 32 ] CVE-2011-2860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860 [ 33 ] CVE-2011-2861 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861 [ 34 ] CVE-2011-2862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862 [ 35 ] CVE-2011-2864 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864 [ 36 ] CVE-2011-2874 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874 [ 37 ] CVE-2011-3234 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234 [ 38 ] CVE-2011-3873 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873 [ 39 ] CVE-2011-3875 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875 [ 40 ] CVE-2011-3876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876 [ 41 ] CVE-2011-3877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877 [ 42 ] CVE-2011-3878 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878 [ 43 ] CVE-2011-3879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879 [ 44 ] CVE-2011-3880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880 [ 45 ] CVE-2011-3881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881 [ 46 ] CVE-2011-3882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882 [ 47 ] CVE-2011-3883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883 [ 48 ] CVE-2011-3884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884 [ 49 ] CVE-2011-3885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885 [ 50 ] CVE-2011-3886 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886 [ 51 ] CVE-2011-3887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887 [ 52 ] CVE-2011-3888 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888 [ 53 ] CVE-2011-3889 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889 [ 54 ] CVE-2011-3890 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890 [ 55 ] CVE-2011-3891 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891 [ 56 ] Release Notes 10.0.648.127 http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html [ 57 ] Release Notes 10.0.648.133 http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html [ 58 ] Release Notes 10.0.648.205 http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html [ 59 ] Release Notes 11.0.696.57 http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html [ 60 ] Release Notes 11.0.696.65 http://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html [ 61 ] Release Notes 11.0.696.68 http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html [ 62 ] Release Notes 11.0.696.71 http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html [ 63 ] Release Notes 12.0.742.112 http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html [ 64 ] Release Notes 12.0.742.91 http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html [ 65 ] Release Notes 13.0.782.107 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html [ 66 ] Release Notes 13.0.782.215 http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html [ 67 ] Release Notes 13.0.782.220 http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html [ 68 ] Release Notes 14.0.835.163 http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html [ 69 ] Release Notes 14.0.835.202 http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html [ 70 ] Release Notes 15.0.874.102 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html [ 71 ] Release Notes 8.0.552.237 http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html [ 72 ] Release Notes 9.0.597.107 http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html [ 73 ] Release Notes 9.0.597.84 http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html [ 74 ] Release Notes 9.0.597.94 http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201111-01.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201109-0190",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "chrome",
"scope": "lt",
"trust": 1.8,
"vendor": "google",
"version": "14.0.835.163"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.1,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.1,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.1,
"vendor": "debian",
"version": "7.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.1,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.1,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.1,
"vendor": "redhat",
"version": "6.3"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.1,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "iphone os",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "6.0"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.7.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.9,
"vendor": "apple",
"version": "10.6.8"
},
{
"model": "esx",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "esx",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.0"
},
{
"model": "esx",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.1"
},
{
"model": "esxi",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "3.5"
},
{
"model": "esxi",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.0"
},
{
"model": "esxi",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "4.1"
},
{
"model": "esxi",
"scope": "eq",
"trust": 0.8,
"vendor": "vmware",
"version": "5.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.3"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "10.6.8"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.7 to v10.7.3"
},
{
"model": "tv",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "5.1 ( first 2 after generation )"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "6 (ipad 2 or later )"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "6 (iphone 3gs or later )"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "6 (ipod touch first 4 after generation )"
},
{
"model": "garoon",
"scope": "eq",
"trust": 0.8,
"vendor": "cybozu",
"version": "2.0.0 to 3.5.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.158"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.159"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.160"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.161"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.7,
"vendor": "google",
"version": "14.0.835.162"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.38.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.38.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.38.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.40.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.42.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.1.42.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.2.149.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.2.149.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.2.149.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.2.152.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.2.153.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.3.154.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.3.154.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.4.154.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.4.154.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.4.154.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "0.4.154.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "1.0.154.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.156.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.157.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.157.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.158.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.159.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.169.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.169.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.170.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "2.0.172.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.182.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.190.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.193.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "3.0.195.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.212.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.212.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.221.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.222.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.222.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.222.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.222.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.223.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.224.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.229.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.235.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.236.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.237.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.237.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.239.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.240.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.241.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.242.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.243.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.244.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.245.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.245.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.246.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.247.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.248.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.73"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.74"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.76"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.79"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.80"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.81"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.249.89"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.250.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.250.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.251.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.252.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.254.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.255.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.256.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.257.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.258.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.259.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.260.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.261.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.262.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.263.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.264.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.265.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.266.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.267.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.268.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.269.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.271.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.272.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.275.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.275.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.276.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.277.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.278.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.286.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.287.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.288.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.288.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.289.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.290.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.292.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.294.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.295.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.296.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.299.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.300.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.301.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.302.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.302.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.302.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.302.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.303.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.304.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.0.305.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1001"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1004"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1006"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1007"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1008"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1009"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1010"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1011"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1012"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1013"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1014"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1015"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1016"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1017"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1018"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1019"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1020"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1021"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1022"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1023"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1024"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1025"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1026"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1027"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1028"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1029"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1030"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1031"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1032"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1033"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1034"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1035"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1036"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1037"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1038"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1039"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1040"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1041"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1042"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1043"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1044"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1045"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1046"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1047"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1048"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1049"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1050"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1051"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1052"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1053"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1054"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1055"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1056"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1057"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1058"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1059"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1060"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1061"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1062"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1063"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "4.1.249.1064"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.306.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.306.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.307.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.308.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.309.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.313.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.314.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.314.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.315.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.316.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.317.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.317.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.317.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.318.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.319.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.320.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.321.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.322.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.322.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.322.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.323.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.324.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.325.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.326.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.327.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.328.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.329.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.330.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.332.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.333.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.334.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.335.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.335.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.335.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.335.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.335.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.336.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.337.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.338.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.339.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.340.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.341.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.342.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.343.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.344.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.345.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.346.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.347.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.348.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.349.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.350.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.350.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.351.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.353.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.354.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.354.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.355.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.356.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.356.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.356.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.357.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.358.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.359.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.360.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.360.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.360.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.360.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.361.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.362.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.363.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.364.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.365.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.366.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.366.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.366.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.366.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.366.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.367.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.368.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.369.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.369.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.369.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.370.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.371.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.372.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.373.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.374.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.73"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.74"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.76"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.79"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.80"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.81"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.83"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.85"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.86"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.87"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.88"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.89"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.91"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.93"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.95"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.96"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.97"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.98"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.99"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.125"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.126"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.375.127"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.376.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.378.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.379.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.380.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.381.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.382.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.382.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.383.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.384.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.385.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.386.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.387.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.390.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.391.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.392.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.393.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.394.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.395.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "5.0.396.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.397.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.398.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.399.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.400.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.401.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.401.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.403.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.404.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.404.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.404.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.405.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.406.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.407.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.408.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.409.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.410.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.411.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.412.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.413.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.414.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.415.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.415.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.416.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.416.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.417.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.418.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.419.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.421.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.422.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.423.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.424.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.425.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.426.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.427.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.428.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.430.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.431.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.432.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.433.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.434.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.435.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.436.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.437.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.437.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.437.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.437.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.438.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.440.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.441.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.443.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.444.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.445.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.445.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.446.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.447.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.447.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.447.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.449.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.450.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.450.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.450.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.450.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.450.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.451.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.452.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.452.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.453.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.453.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.454.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.455.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.456.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.457.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.458.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.458.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.458.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.459.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.460.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.461.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.462.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.464.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.465.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.465.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.466.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.467.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.469.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.470.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.471.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.472.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.473.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.474.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.475.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.476.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.477.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.478.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.479.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.480.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.481.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.482.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.483.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.484.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.485.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.486.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.487.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.488.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.489.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.490.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.490.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.491.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.492.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.493.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.494.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.495.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.495.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "6.0.496.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.497.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.498.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.499.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.499.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.500.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.500.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.503.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.503.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.504.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.505.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.506.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.507.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.507.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.507.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.507.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.509.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.510.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.511.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.511.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.511.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.512.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.513.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.514.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.514.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.515.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.516.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.517.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.518.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.519.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.520.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.521.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.522.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.524.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.525.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.526.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.528.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.529.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.529.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.529.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.530.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.531.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.531.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.531.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.535.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.535.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.536.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.536.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.536.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.536.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.536.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.537.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.538.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.539.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.540.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.541.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.542.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.544.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.547.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.547.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "7.0.548.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.549.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.550.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.551.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.551.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.103"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.104"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.200"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.201"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.202"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.203"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.204"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.205"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.206"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.207"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.208"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.209"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.210"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.211"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.212"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.213"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.214"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.215"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.216"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.217"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.218"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.219"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.220"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.221"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.222"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.223"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.224"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.225"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.226"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.227"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.228"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.229"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.230"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.231"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.232"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.233"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.234"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.235"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.237"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.300"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.301"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.302"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.303"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.304"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.305"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.306"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.307"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.308"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.309"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.310"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.311"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.312"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.313"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.315"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.316"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.317"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.318"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.319"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.320"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.321"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.322"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.323"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.324"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.325"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.326"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.327"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.328"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.329"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.330"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.331"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.332"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.333"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.334"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.335"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.336"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.337"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.338"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.339"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.340"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.341"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.342"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.343"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.552.344"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.553.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.554.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.555.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.556.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.557.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.558.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.559.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.560.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "8.0.561.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.562.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.563.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.564.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.565.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.566.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.567.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.568.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.569.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.570.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.570.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.571.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.572.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.572.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.573.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.574.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.575.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.576.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.577.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.578.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.579.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.580.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.581.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.582.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.583.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.584.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.585.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.586.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.587.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.587.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.588.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.589.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.590.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.591.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.592.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.593.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.594.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.595.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.596.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.73"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.74"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.76"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.79"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.80"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.81"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.83"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.85"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.86"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.88"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.96"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.97"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.98"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.99"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.106"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.597.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.598.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.599.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "9.0.600.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.601.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.602.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.603.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.603.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.603.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.604.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.605.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.606.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.607.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.608.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.609.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.610.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.611.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.611.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.612.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.612.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.612.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.612.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.613.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.614.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.615.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.616.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.617.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.618.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.619.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.620.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.621.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.622.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.622.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.623.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.624.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.625.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.626.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.627.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.628.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.629.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.630.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.631.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.632.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.633.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.634.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.634.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.635.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.636.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.638.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.638.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.639.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.640.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.642.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.642.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.642.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.643.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.644.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.645.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.646.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.647.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.76"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.79"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.87"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.103"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.114"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.116"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.118"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.119"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.120"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.121"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.122"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.123"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.124"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.125"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.126"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.127"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.128"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.129"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.130"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.131"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.132"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.133"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.134"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.135"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.151"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.201"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.203"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.204"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.648.205"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.649.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.650.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "10.0.651.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.652.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.653.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.654.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.655.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.656.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.657.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.658.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.658.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.659.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.660.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.661.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.662.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.663.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.664.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.665.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.666.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.667.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.667.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.667.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.667.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.668.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.669.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.670.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.671.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.672.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.672.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.672.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.673.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.674.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.675.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.676.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.677.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.678.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.679.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.680.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.681.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.682.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.683.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.684.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.685.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.686.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.686.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.686.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.686.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.687.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.687.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.688.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.689.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.690.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.690.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.691.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.692.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.693.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.694.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.695.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.696.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.697.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.698.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "11.0.699.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.700.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.701.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.702.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.702.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.702.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.703.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.704.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.705.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.706.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.707.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.708.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.709.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.710.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.711.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.712.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.713.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.714.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.715.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.716.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.717.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.718.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.719.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.719.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.720.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.721.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.721.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.722.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.723.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.723.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.724.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.725.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.726.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.727.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.728.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.729.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.730.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.731.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.732.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.733.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.734.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.735.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.736.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.737.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.738.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.739.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.740.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.741.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.72"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.73"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.74"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.91"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.93"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.111"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.112"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.113"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.114"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.115"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.120"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.121"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.122"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.123"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.742.124"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.743.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.744.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.745.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.746.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "12.0.747.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.748.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.749.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.750.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.751.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.752.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.753.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.754.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.755.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.756.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.757.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.758.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.759.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.760.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.761.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.761.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.762.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.762.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.763.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.764.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.765.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.766.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.767.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.767.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.768.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.769.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.770.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.771.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.772.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.773.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.774.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.775.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.775.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.775.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.775.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.776.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.776.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.777.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.778.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.779.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.780.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.781.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.81"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.83"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.85"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.86"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.87"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.88"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.89"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.91"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.93"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.95"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.96"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.97"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.98"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.99"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.103"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.104"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.106"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.108"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.109"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.112"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.210"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.211"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.212"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.213"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.214"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.215"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.216"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.217"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.218"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.219"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.220"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.237"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "13.0.782.238"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.783.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.784.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.785.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.786.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.787.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.788.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.789.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.790.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.791.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.792.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.793.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.794.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.795.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.796.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.797.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.798.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.799.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.800.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.801.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.802.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.803.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.804.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.805.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.806.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.807.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.808.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.809.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.810.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.811.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.812.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.813.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.814.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.815.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.816.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.818.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.819.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.820.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.821.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.822.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.823.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.824.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.825.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.826.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.827.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.827.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.827.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.829.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.830.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.831.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.832.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.833.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.834.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.86"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.87"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.88"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.89"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.91"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.93"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.95"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.96"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.97"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.98"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.99"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.103"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.104"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.106"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.108"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.109"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.110"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.111"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.112"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.113"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.114"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.115"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.116"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.117"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.118"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.119"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.120"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.121"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.122"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.123"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.124"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.125"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.126"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.127"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.128"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.149"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.150"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.151"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.152"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.153"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.154"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.155"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.156"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.1,
"vendor": "google",
"version": "14.0.835.157"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.0.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.0.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.3"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.4"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "1.1.5"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.0.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.1.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "2.2.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.0.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.1.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.1.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.1.3"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.2.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.0.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.0.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.5"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.6"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.7"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.8"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.9"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.2.10"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.3"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.4"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "4.3.5"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "5.0"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "5.0.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "5.1"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "5.1.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.0.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.1.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.2.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.3.9"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.9"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.10"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.5.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.3"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.4"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.5"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.6.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.7.0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.7.1"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.7.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.1,
"vendor": "apple",
"version": "10.7.3"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:google:chrome",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:vmware:esx",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:vmware:esxi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:apple_tv",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:iphone_os",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:cybozu:garoon",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple",
"sources": [
{
"db": "PACKETSTORM",
"id": "112595"
},
{
"db": "PACKETSTORM",
"id": "116791"
}
],
"trust": 0.2
},
"cve": "CVE-2011-2834",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2011-2834",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-50779",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-2834",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2011-2834",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201109-684",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-50779",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2011-2834",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. libxml2 Is XPath There is a flaw in memory double release due to incomplete processing.Service disruption by a third party (DoS) May result in a condition or other unclear effects. Google Chrome is a web browser developed by Google (Google). The login process recorded sensitive information in the\nsystem log, where other users of the system could read it. The\nsensitive information may persist in saved logs after installation of\nthis update. See http://support.apple.com/kb/TS4272 for more\ninformation on how to securely remove any remaining records. This\nissue only affects systems running OS X Lion v10.7.3 with users of\nLegacy File Vault and/or networked home directories. \nCVE-ID\nCVE-2012-0652 : Terry Reeves and Tim Winningham of the Ohio State\nUniversity, Markus \u0027Jaroneko\u0027 Raty of the Finnish Academy of Fine\nArts, Jaakko Pero of Aalto University, Mark Cohen of Oregon State\nUniversity, Paul Nelson\n\nBluetooth\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A temporary file race condition issue existed in\nblued\u0027s initialization routine. \nCVE-ID\nCVE-2012-0649 : Aaron Sigel of vtty.com\n\ncurl\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \ncurl disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. \nThis issue does not affect systems prior to OS X Lion. \nCVE-ID\nCVE-2012-0036\n\nDirectory Service\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: A remote attacker may obtain sensitive information\nDescription: Multiple issues existed in the directory server\u0027s\nhandling of messages from the network. By sending a maliciously\ncrafted message, a remote attacker could cause the directory server\nto disclose memory from its address space, potentially revealing\naccount credentials or other sensitive information. This issue does\nnot affect OS X Lion systems. The Directory Server is disabled by\ndefault in non-server installations of OS X. This issue does not affect OS X\nLion systems. \nCVE-ID\nCVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies\n\nImageIO\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: Multiple vulnerabilities in libpng\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to information\ndisclosure. \nCVE-ID\nCVE-2011-1167\n\nKernel\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: When FileVault is used, the disk may contain unencrypted\nuser data\nDescription: An issue in the kernel\u0027s handling of the sleep image\nused for hibernation left some data unencrypted on disk even when\nFileVault was enabled. This issue is addressed through improved\nhandling of the sleep image, and by overwriting the existing sleep\nimage when updating to OS X v10.7.4. This issue does not affect\nsystems prior to OS X Lion. \nCVE-ID\nCVE-2012-0654 : Dirk-Willem van Gulik of WebWeaving.org, Guilherme\nPrado of Conselho da Justica Federal, Ryan Sleevi of Google\n\nlibsecurity\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Support for X.509 certificates with insecure-length RSA keys\nmay expose users to spoofing and information disclosure\nDescription: Certificates signed using RSA keys with insecure key\nlengths were accepted by libsecurity. This issue is addressed by\nrejecting certificates containing RSA keys less than 1024 bits. This issue does not affect systems prior to OS X Lion. Further information is available via the PHP web site at\nhttp://www.php.net\nCVE-ID\nCVE-2011-4566\nCVE-2011-4885\nCVE-2012-0830\n\nQuartz Composer\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: A user with physical access to the computer may be able to\ncause Safari to launch if the screen is locked and the RSS Visualizer\nscreen saver is used\nDescription: An access control issue existed in Quartz Composer\u0027s\nhandling of screen savers. This issue does not affect systems\nprior to OS X Lion. \nCVE-ID\nCVE-2012-0661 : Damian Put working with HP\u0027s Zero Day Initiative\n\nRuby\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Multiple vulnerabilities in Ruby\nDescription: Ruby is updated to 1.8.7-p357 to address multiple\nvulnerabilities. By sending a maliciously crafted packet,\nan unauthenticated remote attacker could cause a denial of service or\narbitrary code execution with system privileges. These issues do not\naffect OS X Lion systems. \nProcessing untrusted input with the Security framework could result\nin memory corruption. This issue does not affect 32-bit processes. \nCVE-ID\nCVE-2012-0662 : aazubel working with HP\u0027s Zero Day Initiative\n\nTime Machine\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: A remote attacker may access a user\u0027s Time Machine backup\ncredentials\nDescription: The user may designate a Time Capsule or remote AFP\nvolume attached to an AirPort Base Station to be used for Time\nMachine backups. Beginning with AirPort Base Station and Time Capsule\nFirmware Update 7.6, Time Capsules and Base Stations support a secure\nSRP-based authentication mechanism over AFP. However, Time Machine\ndid not require that the SRP-based authentication mechanism was used\nfor subsequent backup operations, even if Time Machine was initially\nconfigured or had ever contacted a Time Capsule or Base Station that\nsupported it. \nCVE-ID\nCVE-2012-0675 : Renaud Deraison of Tenable Network Security, Inc. \nCVE-ID\nCVE-2011-2895 : Tomas Hoger of Red Hat\n\n\nNote: Additionally, this update filters dynamic linker environment\nvariables from a customized environment property list in the user\u0027s\nhome directory, if present. Only one is needed, either\nSecurity Update 2012-002 or OS X v10.7.4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03360041\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03360041\nVersion: 1\n\nHPSBMU02786 SSRT100877 rev.1 - HP System Management Homepage (SMH) Running on\nLinux and Windows, Remote Unauthorized Access, Disclosure of Information,\nData Modification, Denial of Service (DoS), Execution of Arbitrary Code\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-06-26\nLast Updated: 2012-06-26\n\nPotential Security Impact: Remote unauthorized access, disclosure of\ninformation, data modification, Denial of Service (DoS), execution of\narbitrary code\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP System\nManagement Homepage (SMH) running on Linux and Windows. \n\nReferences: CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-3379,\nCVE-2011-3607, CVE-2011-4078, CVE-2011-4108, CVE-2011-4153, CVE-2011-4317,\nCVE-2011-4415, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2011-4885,\nCVE-2012-0021, CVE-2012-0027, CVE-2012-0031, CVE-2012-0036, CVE-2012-0053,\nCVE-2012-0057, CVE-2012-0830, CVE-2012-1165, CVE-2012-1823,\nCVE-2012-2012 (AUTOCOMPLETE enabled), CVE-2012-2013 (DoS),\nCVE-2012-2014 (Improper input validation), CVE-2012-2015 (Privilege\nElevation),\nCVE-2012-2016 (Information disclosure),\nSSRT100336, SSRT100753, SSRT100669, SSRT100676,\nSSRT100695, SSRT100714, SSRT100760, SSRT100786,\nSSRT100787, SSRT100815, SSRT100840, SSRT100843, SSRT100869\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP System Management Homepage (SMH) before v7.1.1 running on Linux and\nWindows. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-2012 (AV:N/AC:L/Au:N/C:C/I:C/A:P) 9.7\nCVE-2012-2013 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2012-2014 (AV:N/AC:M/Au:S/C:N/I:N/A:N) 6.8\nCVE-2012-2015 (AV:N/AC:M/Au:S/C:P/I:N/A:N) 6.5\nCVE-2012-2016 (AV:L/AC:M/Au:S/C:C/I:N/A:N) 4.4\nCVE-2011-1944 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 9.3\nCVE-2011-2821 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-2834 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2011-3379 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4\nCVE-2011-4078 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4108 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2011-4153 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2011-4415 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1.2\nCVE-2011-4576 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-4577 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-4619 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-4885 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0021 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 2.6\nCVE-2012-0027 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6\nCVE-2012-0036 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-0053 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2012-0057 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\nCVE-2012-0830 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-1165 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-1823 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided HP System Management Homepage v7.1.1 or subsequent to resolve\nthe vulnerabilities. HP System Management Homepage v7.1.1 is available here:\n\nHP System Management Homepage for Windows x64\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4064%257CswLang%253D8%257CswItem%253DMTX-ab\n0d4e9bb4654a8da503eccfd9%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Windows x86\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4022%257CswLang%253D8%257CswItem%253DMTX-f7\nc0d15d28474255bd0ec23136%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Linux (AMD64/EM64T)\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4035%257CswLang%253D8%257CswItem%253DMTX-18\nd373dd1361400fbaca892942%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHP System Management Homepage for Linux (x86)\n\n[Download here] or enter the following URL into the browser address window. \n\nhttp://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetail\ns/?sp4ts.oid=4091409\u0026spf_p.tpst=psiSwdMain\u0026spf_p.prp_psiSwdMain=wsrp-navigati\nonalState%3Dlang%253Den%257Ccc%253DUS%257CprodSeriesId%253D4091408%257CprodNa\nmeId%253D4091409%257CswEnvOID%253D4006%257CswLang%253D8%257CswItem%253DMTX-9e\n8a0188f97d48139dcb466509%257Cmode%253D3%257Caction%253DdriverDocument\u0026javax.p\nortlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vign\nette.cachetoken\n\nHISTORY\nVersion:1 (rev.1) 26 June 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\nCVE-2011-2821:\nA memory corruption (double free) bug has been identified in libxml2\u0027s XPath\nengine. This vulnerability does not\naffect the oldstable distribution (lenny). \n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.6.32.dfsg-5+lenny5. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 2.7.8.dfsg-2+squeeze2. \n\nFor the testing distribution (wheezy), this problem has been fixed in\nversion 2.7.8.dfsg-7. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2.7.8.dfsg-7. Summary\n\n VMware ESX updates to ESX Service Console. Problem Description\n\n a. ESX third party update for Service Console kernel\n\n The ESX Service Console Operating System (COS) kernel is updated\n which addresses several security issues in the COS kernel. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2011-3191, CVE-2011-4348 and CVE-2012-0028 to\n these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201204401-SG\n ESX 4.0 ESX patch pending **\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. See\n VMSA-2012-0006 for details. \n\n b. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2010-4008, CVE-2011-0216, CVE-2011-1944,\n CVE-2011-2834, CVE-2011-3905, CVE-2011-3919 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201204402-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. Solution\n\n Please review the patch/release notes for your product and version\n and verify the checksum of your downloaded file. \n \n ESX 4.1\n -------\n ESX410-201204001\n md5sum: 7994635547b375b51422b1a166c6e214\n sha1sum: 9d5f3c9cbc53a9e03524b9bf0935c71f3dadf620\n http://kb.vmware.com/kb/2013057\n\n ESX410-201204001 contains ESX410-201204401-SG and\n ESX410-201204402-SG\n \n5. Change log\n\n 2012-04-26 VMSA-2012-0008\n Initial security advisory in conjunction with the release of\n patches for ESX 4.1 on 2012-04-26. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Advisories\nhttp://www.vmware.com/security/advisories\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2012 VMware Inc. All rights reserved. Summary:\n\nUpdated libxml2 packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. Description:\n\nThe libxml2 library is a development toolbox providing the implementation\nof various XML standards. One of those standards is the XML Path Language\n(XPath), which is a language for addressing parts of an XML document. \n\nA heap-based buffer overflow flaw was found in the way libxml2 decoded\nentity references with long names. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-3919)\n\nAn off-by-one error, leading to a heap-based buffer overflow, was found in\nthe way libxml2 parsed certain XML files. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0216)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way libxml2 parsed certain XPath expressions. If an attacker\nwere able to supply a specially-crafted XML file to an application using\nlibxml2, as well as an XPath expression for that application to run against\nthe crafted file, it could cause the application to crash or, possibly,\nexecute arbitrary code. (CVE-2011-1944)\n\nFlaws were found in the way libxml2 parsed certain XPath expressions. If an\nattacker were able to supply a specially-crafted XML file to an application\nusing libxml2, as well as an XPath expression for that application to run\nagainst the crafted file, it could cause the application to crash. \n(CVE-2010-4008, CVE-2011-2834)\n\nAn out-of-bounds memory read flaw was found in libxml2. A remote attacker\ncould provide a specially-crafted XML file that, when opened in an\napplication linked against libxml2, would cause the application to crash. \n(CVE-2011-3905)\n\nNote: Red Hat does not ship any applications that use libxml2 in a way that\nwould allow the CVE-2011-1944, CVE-2010-4008, and CVE-2011-2834 flaws to be\nexploited; however, third-party applications may allow XPath expressions to\nbe passed which could trigger these flaws. Upstream acknowledges Bui Quang Minh from Bkis as the\noriginal reporter of CVE-2010-4008. \n\nAll users of libxml2 are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The desktop must\nbe restarted (log out, then log back in) for this update to take effect. \n\n4. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n645341 - CVE-2010-4008 libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis\n709747 - CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets\n724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding\n735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT\n767387 - CVE-2011-3905 libxml2 out of bounds read\n771896 - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm\n\ni386:\nlibxml2-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.i386.rpm\n\nx86_64:\nlibxml2-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm\n\ni386:\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm\n\nx86_64:\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libxml2-2.6.26-2.1.12.el5_7.2.src.rpm\n\ni386:\nlibxml2-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.i386.rpm\n\nia64:\nlibxml2-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-2.6.26-2.1.12.el5_7.2.ia64.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ia64.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.ia64.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.ia64.rpm\n\nppc:\nlibxml2-2.6.26-2.1.12.el5_7.2.ppc.rpm\nlibxml2-2.6.26-2.1.12.el5_7.2.ppc64.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ppc.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.ppc64.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.ppc.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.ppc64.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.ppc.rpm\n\ns390x:\nlibxml2-2.6.26-2.1.12.el5_7.2.s390.rpm\nlibxml2-2.6.26-2.1.12.el5_7.2.s390x.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.s390.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.s390x.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.s390.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.s390x.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.s390x.rpm\n\nx86_64:\nlibxml2-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-debuginfo-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.i386.rpm\nlibxml2-devel-2.6.26-2.1.12.el5_7.2.x86_64.rpm\nlibxml2-python-2.6.26-2.1.12.el5_7.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-4008.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-0216.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1944.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2834.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3905.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3919.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-09-19-1 iOS 6\n\niOS 6 is now available and addresses the following:\n\nCFNetwork\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. CFNetwork may send requests to an incorrect hostname, resulting\nin the disclosure of sensitive information. This issue was addressed\nthrough improvements to URL handling. \nCVE-ID\nCVE-2012-3724 : Erling Ellingsen of Facebook\n\nCoreGraphics\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Multiple vulnerabilities in FreeType\nDescription: Multiple vulnerabilities existed in FreeType, the most\nserious of which may lead to arbitrary code execution when processing\na maliciously crafted font. These issues were addressed by updating\nFreeType to version 2.4.9. Further information is available via the\nFreeType site at http://www.freetype.org/\nCVE-ID\nCVE-2012-1126\nCVE-2012-1127\nCVE-2012-1128\nCVE-2012-1129\nCVE-2012-1130\nCVE-2012-1131\nCVE-2012-1132\nCVE-2012-1133\nCVE-2012-1134\nCVE-2012-1135\nCVE-2012-1136\nCVE-2012-1137\nCVE-2012-1138\nCVE-2012-1139\nCVE-2012-1140\nCVE-2012-1141\nCVE-2012-1142\nCVE-2012-1143\nCVE-2012-1144\n\nCoreMedia\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access existed in the handling\nof Sorenson encoded movie files. This issue was addressed through\nimproved memory initialization. \nCVE-ID\nCVE-2012-3722 : Will Dormann of the CERT/CC\n\nDHCP\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A malicious Wi-Fi network may be able to determine networks\na device has previously accessed\nDescription: Upon connecting to a Wi-Fi network, iOS may broadcast\nMAC addresses of previously accessed networks per the DNAv4 protocol. \nThis issue was addressed by disabling DNAv4 on unencrypted Wi-Fi\nnetworks. \nCVE-ID\nCVE-2012-3725 : Mark Wuergler of Immunity, Inc. \n\nImageIO\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in libtiff\u0027s handling of\nThunderScan encoded TIFF images. This issue was addressed by updating\nlibtiff to version 3.9.5. \nCVE-ID\nCVE-2011-1167\n\nImageIO\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted PNG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in libpng\u0027s\nhandling of PNG images. These issues were addressed through improved\nvalidation of PNG images. \nCVE-ID\nCVE-2011-3026 : Juri Aedla\nCVE-2011-3048\nCVE-2011-3328\n\nImageIO\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted JPEG image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A double free issue existed in ImageIO\u0027s handling of\nJPEG images. This issue was addressed through improved memory\nmanagement. \nCVE-ID\nCVE-2012-3726 : Phil of PKJE Consulting\n\nImageIO\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted TIFF image may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow issue existed in libTIFF\u0027s handling\nof TIFF images. This issue was addressed through improved validation\nof TIFF images. \nCVE-ID\nCVE-2012-1173 : Alexander Gavrun working with HP\u0027s Zero Day\nInitiative\n\nInternational Components for Unicode\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Applications that use ICU may be vulnerable to an unexpected\napplication termination or arbitrary code execution\nDescription: A stack buffer overflow existed in the handling of ICU\nlocale IDs. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2011-4599\n\nIPSec\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Loading a maliciously crafted racoon configuration file may\nlead to arbitrary code execution\nDescription: A buffer overflow existed in the handling of racoon\nconfiguration files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2012-3727 : iOS Jailbreak Dream Team\n\nKernel\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: An invalid pointer dereference issue existed in the\nkernel\u0027s handling of packet filter ioctls. This may allow an attacker\nto alter kernel memory. This issue was addressed through improved\nerror handling. \nCVE-ID\nCVE-2012-3728 : iOS Jailbreak Dream Team\n\nKernel\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An uninitialized memory access issue existed in the\nBerkeley Packet Filter interpreter, which led to the disclosure of\nmemory content. This issue was addressed through improved memory\ninitialization. \nCVE-ID\nCVE-2012-3729 : Dan Rosenberg\n\nlibxml\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted web page may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple vulnerabilities existed in libxml, the most\nserious of which may lead to an unexpected application termination or\narbitrary code execution. These issues were addressed by applying the\nrelevant upstream patches. \nCVE-ID\nCVE-2011-1944 : Chris Evans of Google Chrome Security Team\nCVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of\nChinese Academy of Sciences\nCVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of\nChinese Academy of Sciences\nCVE-2011-3919 : Juri Aedla\n\nMail\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Mail may present the wrong attachment in a message\nDescription: A logic issue existed in Mail\u0027s handling of\nattachments. If a subsequent mail attachment used the same Content-ID\nas a previous one, the previous attachment would be displayed, even\nin the case where the 2 mails originated from different senders. This\ncould facilitate some spoofing or phishing attacks. This issue was\naddressed through improved handling of attachments. \nCVE-ID\nCVE-2012-3730 : Angelo Prado of the salesforce.com Product Security\nTeam\n\nMail\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Email attachments may be read without user\u0027s passcode\nDescription: A logic issue existed in Mail\u0027s use of Data Protection\non email attachments. This issue was addressed by properly setting\nthe Data Protection class for email attachments. \nCVE-ID\nCVE-2012-3731 : Stephen Prairie of Travelers Insurance, Erich\nStuntebeck of AirWatch\n\nMail\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: An attacker may spoof the sender of a S/MIME signed message\nDescription: S/MIME signed messages displayed the untrusted \u0027From\u0027\naddress, instead of the name associated with the message signer\u0027s\nidentity. This issue was addressed by displaying the address\nassociated with the message signer\u0027s identity when it is available. \nCVE-ID\nCVE-2012-3732 : An anonymous researcher\n\nMessages\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A user may unintentionally disclose the existence of their\nemail addresses\nDescription: When a user had multiple email addresses associated\nwith iMessage, replying to a message may have resulted in the reply\nbeing sent from a different email address. This may disclose another\nemail address associated to the user\u0027s account. This issue was\naddressed by always replying from the email address the original\nmessage was sent to. \nCVE-ID\nCVE-2012-3733 : Rodney S. Foley of Gnomesoft, LLC\n\nOffice Viewer\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Unencrypted document data may be written to a temporary file\nDescription: An information disclosure issue existed in the support\nfor viewing Microsoft Office files. When viewing a document, the\nOffice Viewer would write a temporary file containing data from the\nviewed document to the temporary directory of the invoking process. \nFor an application that uses data protection or other encryption to\nprotect the user\u0027s files, this could lead to information\ndisclosure. This issue was addressed by avoiding creation of\ntemporary files when viewing Office documents. \nCVE-ID\nCVE-2012-3734 : Salvatore Cataudella of Open Systems Technologies\n\nOpenGL\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Applications that use OS X\u0027s OpenGL implementation may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: Multiple memory corruption issues existed in the\nhandling of GLSL compilation. These issues were addressed through\nimproved validation of GLSL shaders. \nCVE-ID\nCVE-2011-3457 : Chris Evans of the Google Chrome Security Team, and\nMarc Schoenefeld of the Red Hat Security Response Team\n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A person with physical access to the device could briefly\nview the last used third-party app on a locked device\nDescription: A logic issue existed with the display of the \"Slide to\nPower Off\" slider on the lock screen. This issue was addressed\nthrough improved lock state management. \nCVE-ID\nCVE-2012-3735 : Chris Lawrence DBB\n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A person with physical access to the device may be able to\nbypass the screen lock\nDescription: A logic issue existed in the termination of FaceTime\ncalls from the lock screen. This issue was addressed through improved\nlock state management. \nCVE-ID\nCVE-2012-3736 : Ian Vitek of 2Secure AB\n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: All photos may be accessible at the lock screen\nDescription: A design issue existed in the support for viewing\nphotos that were taken at the lock screen. In order to determine\nwhich photos to permit access to, the passcode lock consulted the\ntime at which the device was locked and compared it to the time that\na photo was taken. By spoofing the current time, an attacker could\ngain access to photos that were taken before the device was locked. \nThis issues was addressed by explicitly keeping track of the photos\nthat were taken while the device was locked. \nCVE-ID\nCVE-2012-3737 : Ade Barkah of BlueWax Inc. \n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A person with physical access to a locked device may perform\nFaceTime calls\nDescription: A logic issue existed in the Emergency Dialer screen,\nwhich permitted FaceTime calls via Voice Dialing on the locked\ndevice. This could also disclose the user\u0027s contacts via contact\nsuggestions. This issue was addressed by disabling Voice Dialing on\nthe Emergency Dialer screen. \nCVE-ID\nCVE-2012-3738 : Ade Barkah of BlueWax Inc. \n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A person with physical access to the device may be able to\nbypass the screen lock\nDescription: Using the camera from the screen lock could in some\ncases interfere with automatic lock functionality, allowing a person\nwith physical access to the device to bypass the Passcode Lock\nscreen. This issue was addressed through improved lock state\nmanagement. \nCVE-ID\nCVE-2012-3739 : Sebastian Spanninger of the Austrian Federal\nComputing Centre (BRZ)\n\nPasscode Lock\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A person with physical access to the device may be able to\nbypass the screen lock\nDescription: A state management issue existed in the handling of the\nscreen lock. This issue was addressed through improved lock state\nmanagement. \nCVE-ID\nCVE-2012-3740 : Ian Vitek of 2Secure AB\n\nRestrictions\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A user may be able to make purchases without entering Apple\nID credentials\nDescription: After disabling Restrictions, iOS may not ask for the\nuser\u0027s password during a transaction. This issue was addressed by\nadditional enforcement of purchase authorization. \nCVE-ID\nCVE-2012-3741 : Kevin Makens of Redwood High School\n\nSafari\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Websites may use characters with an appearance similar to\nthe lock icon in their titles\nDescription: Websites could use a Unicode character to create a lock\nicon in the page title. This icon was similar in appearance to the\nicon used to indicate a secure connection, and could have lead the\nuser to believe a secure connection had been established. This issue\nwas addressed by removing these characters from page titles. \nCVE-ID\nCVE-2012-3742 : Boku Kihara of Lepidum\n\nSafari\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Passwords may autocomplete even when the site specifies that\nautocomplete should be disabled\nDescription: Password input elements with the autocomplete attribute\nset to \"off\" were being autocompleted. This issue was addressed\nthrough improved handling of the autocomplete attribute. \nCVE-ID\nCVE-2012-0680 : Dan Poltawski of Moodle\n\nSystem Logs\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Sandboxed apps may obtain system log content\nDescription: Sandboxed apps had read access to /var/log directory,\nwhich may allow them to obtain sensitive information contained in\nsystem logs. This issue was addressed by denying sandboxed apps\naccess to the /var/log directory. \nCVE-ID\nCVE-2012-3743\n\nTelephony\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: An SMS message may appear to have been sent by an arbitrary\nuser\nDescription: Messages displayed the return address of an SMS message\nas the sender. Return addresses may be spoofed. This issue was\naddressed by always displaying the originating address instead of the\nreturn address. \nCVE-ID\nCVE-2012-3744 : pod2g\n\nTelephony\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: An SMS message may disrupt cellular connectivity\nDescription: An off-by-one buffer overflow existed in the handling\nof SMS user data headers. This issue was addressed through improved\nbounds checking. \nCVE-ID\nCVE-2012-3745 : pod2g\n\nUIKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: An attacker that gains access to a device\u0027s filesystem may\nbe able to read files that were being displayed in a UIWebView\nDescription: Applications that use UIWebView may leave unencrypted\nfiles on the file system even when a passcode is enabled. This issue\nwas addressed through improved use of data protection. \nCVE-ID\nCVE-2012-3746 : Ben Smith of Box\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in WebKit. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2011-3016 : miaubiz\nCVE-2011-3021 : Arthur Gerkis\nCVE-2011-3027 : miaubiz\nCVE-2011-3032 : Arthur Gerkis\nCVE-2011-3034 : Arthur Gerkis\nCVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur\nGerkis\nCVE-2011-3036 : miaubiz\nCVE-2011-3037 : miaubiz\nCVE-2011-3038 : miaubiz\nCVE-2011-3039 : miaubiz\nCVE-2011-3040 : miaubiz\nCVE-2011-3041 : miaubiz\nCVE-2011-3042 : miaubiz\nCVE-2011-3043 : miaubiz\nCVE-2011-3044 : Arthur Gerkis\nCVE-2011-3050 : miaubiz\nCVE-2011-3053 : miaubiz\nCVE-2011-3059 : Arthur Gerkis\nCVE-2011-3060 : miaubiz\nCVE-2011-3064 : Atte Kettunen of OUSPG\nCVE-2011-3068 : miaubiz\nCVE-2011-3069 : miaubiz\nCVE-2011-3071 : pa_kt working with HP\u0027s Zero Day Initiative\nCVE-2011-3073 : Arthur Gerkis\nCVE-2011-3074 : Slawomir Blazek\nCVE-2011-3075 : miaubiz\nCVE-2011-3076 : miaubiz\nCVE-2011-3078 : Martin Barbella of the Google Chrome Security Team\nCVE-2011-3081 : miaubiz\nCVE-2011-3086 : Arthur Gerkis\nCVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz\nCVE-2011-3090 : Arthur Gerkis\nCVE-2011-3105 : miaubiz\nCVE-2011-3913 : Arthur Gerkis\nCVE-2011-3924 : Arthur Gerkis\nCVE-2011-3926 : Arthur Gerkis\nCVE-2011-3958 : miaubiz\nCVE-2011-3966 : Aki Helin of OUSPG\nCVE-2011-3968 : Arthur Gerkis\nCVE-2011-3969 : Arthur Gerkis\nCVE-2011-3971 : Arthur Gerkis\nCVE-2012-0682 : Apple Product Security\nCVE-2012-0683 : Dave Mandelin of Mozilla\nCVE-2012-1520 : Martin Barbella of the Google Chrome Security Team\nusing AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com\nworking with iDefense VCP\nCVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. \nVazquez of spa-s3c.blogspot.com working with iDefense VCP\nCVE-2012-2818 : miaubiz\nCVE-2012-3589 : Dave Mandelin of Mozilla\nCVE-2012-3590 : Apple Product Security\nCVE-2012-3591 : Apple Product Security\nCVE-2012-3592 : Apple Product Security\nCVE-2012-3593 : Apple Product Security\nCVE-2012-3594 : miaubiz\nCVE-2012-3595 : Martin Barbella of Google Chrome Security\nCVE-2012-3596 : Skylined of the Google Chrome Security Team\nCVE-2012-3597 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3598 : Apple Product Security\nCVE-2012-3599 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3600 : David Levin of the Chromium development community\nCVE-2012-3601 : Martin Barbella of the Google Chrome Security Team\nusing AddressSanitizer\nCVE-2012-3602 : miaubiz\nCVE-2012-3603 : Apple Product Security\nCVE-2012-3604 : Skylined of the Google Chrome Security Team\nCVE-2012-3605 : Cris Neckar of the Google Chrome Security team\nCVE-2012-3608 : Skylined of the Google Chrome Security Team\nCVE-2012-3609 : Skylined of the Google Chrome Security Team\nCVE-2012-3610 : Skylined of the Google Chrome Security Team\nCVE-2012-3611 : Apple Product Security\nCVE-2012-3612 : Skylined of the Google Chrome Security Team\nCVE-2012-3613 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3614 : Yong Li of Research In Motion, Inc. \nCVE-2012-3615 : Stephen Chenney of the Chromium development community\nCVE-2012-3617 : Apple Product Security\nCVE-2012-3618 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3620 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3624 : Skylined of the Google Chrome Security Team\nCVE-2012-3625 : Skylined of Google Chrome Security Team\nCVE-2012-3626 : Apple Product Security\nCVE-2012-3627 : Skylined and Abhishek Arya (Inferno) of Google Chrome\nSecurity team\nCVE-2012-3628 : Apple Product Security\nCVE-2012-3629 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3630 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3631 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3633 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3634 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3635 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3636 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3637 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3638 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3639 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3640 : miaubiz\nCVE-2012-3641 : Slawomir Blazek\nCVE-2012-3642 : miaubiz\nCVE-2012-3644 : miaubiz\nCVE-2012-3645 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3646 : Julien Chaffraix of the Chromium development\ncommunity, Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3647 : Skylined of the Google Chrome Security Team\nCVE-2012-3648 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3651 : Abhishek Arya (Inferno) and Martin Barbella of the\nGoogle Chrome Security Team\nCVE-2012-3652 : Martin Barbella of Google Chrome Security Team\nCVE-2012-3653 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3655 : Skylined of the Google Chrome Security Team\nCVE-2012-3656 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3658 : Apple\nCVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya\n(Inferno) of the Google Chrome Security Team\nCVE-2012-3660 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3661 : Apple Product Security\nCVE-2012-3663 : Skylined of Google Chrome Security Team\nCVE-2012-3664 : Thomas Sepez of the Chromium development community\nCVE-2012-3665 : Martin Barbella of Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-3666 : Apple\nCVE-2012-3667 : Trevor Squires of propaneapp.com\nCVE-2012-3668 : Apple Product Security\nCVE-2012-3669 : Apple Product Security\nCVE-2012-3670 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam, Arthur Gerkis\nCVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome\nSecurity Team\nCVE-2012-3672 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3673 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3674 : Skylined of Google Chrome Security Team\nCVE-2012-3676 : Julien Chaffraix of the Chromium development\ncommunity\nCVE-2012-3677 : Apple\nCVE-2012-3678 : Apple Product Security\nCVE-2012-3679 : Chris Leary of Mozilla\nCVE-2012-3680 : Skylined of Google Chrome Security Team\nCVE-2012-3681 : Apple\nCVE-2012-3682 : Adam Barth of the Google Chrome Security Team\nCVE-2012-3683 : wushi of team509 working with iDefense VCP\nCVE-2012-3684 : kuzzcc\nCVE-2012-3686 : Robin Cao of Torch Mobile (Beijing)\nCVE-2012-3703 : Apple Product Security\nCVE-2012-3704 : Skylined of the Google Chrome Security Team\nCVE-2012-3706 : Apple Product Security\nCVE-2012-3708 : Apple\nCVE-2012-3710 : James Robinson of Google\nCVE-2012-3747 : David Bloom of Cue\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to a cross-\nsite disclosure of information\nDescription: A cross-origin issue existed in the handling of CSS\nproperty values. This issue was addressed through improved origin\ntracking. \nCVE-ID\nCVE-2012-3691 : Apple\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: A malicious website may be able to replace the contents of\nan iframe on another site\nDescription: A cross-origin issue existed in the handling of iframes\nin popup windows. This issue was addressed through improved origin\ntracking. \nCVE-ID\nCVE-2011-3067 : Sergey Glazunov\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to a cross-\nsite disclosure of information\nDescription: A cross-origin issue existed in the handling of iframes\nand fragment identifiers. This issue was addressed through improved\norigin tracking. \nCVE-ID\nCVE-2012-2815 : Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt,\nand Dan Boneh of the Stanford University Security Laboratory\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Look-alike characters in a URL could be used to masquerade a\nwebsite\nDescription: The International Domain Name (IDN) support and Unicode\nfonts embedded in Safari could have been used to create a URL which\ncontains look-alike characters. These could have been used in a\nmalicious website to direct the user to a spoofed site that visually\nappears to be a legitimate domain. This issue was addressed by\nsupplementing WebKit\u0027s list of known look-alike characters. Look-\nalike characters are rendered in Punycode in the address bar. \nCVE-ID\nCVE-2012-3693 : Matt Cooley of Symantec\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to a cross-\nsite scripting attack\nDescription: A canonicalization issue existed in the handling of\nURLs. This may have led to cross-site scripting on sites which use\nthe location.href property. This issue was addressed through improved\ncanonicalization of URLs. \nCVE-ID\nCVE-2012-3695 : Masato Kinugawa\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to HTTP\nrequest splitting\nDescription: An HTTP header injection issue existed in the handling\nof WebSockets. This issue was addressed through improved WebSockets\nURI sanitization. \nCVE-ID\nCVE-2012-3696 : David Belcher of the BlackBerry Security Incident\nResponse Team\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: A maliciously crafted website may be able to spoof the value\nin the URL bar\nDescription: A state management issue existed in the handling of\nsession history. Navigations to a fragment on the current page may\ncause Safari to display incorrect information in the URL bar. This\nissue was addressed through improved session state tracking. \nCVE-ID\nCVE-2011-2845 : Jordi Chancel\n\nWebKit\nAvailable for: iPhone 3GS and later,\niPod touch (4th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of the disclosure of memory contents\nDescription: An uninitialized memory access issue existed in the\nhandling of SVG images. This issue was addressed through improved\nmemory initialization. \nCVE-ID\nCVE-2012-3650 : Apple\n\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update will be \"6.0\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nXtT4lS60xKz63YSg79dd\n=LvMt\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201111-01\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Chromium, V8: Multiple vulnerabilities\n Date: November 01, 2011\n Bugs: #351525, #353626, #354121, #356933, #357963, #358581,\n #360399, #363629, #365125, #366335, #367013, #368649,\n #370481, #373451, #373469, #377475, #377629, #380311,\n #380897, #381713, #383251, #385649, #388461\n ID: 201111-01\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been reported in Chromium and V8, some of\nwhich may allow execution of arbitrary code and local root privilege\nescalation. \n\nBackground\n==========\n\nChromium is an open-source web browser project. V8 is Google\u0027s open\nsource JavaScript engine. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/chromium \u003c 15.0.874.102 \u003e= 15.0.874.102 \n 2 dev-lang/v8 \u003c 3.5.10.22 \u003e= 3.5.10.22 \n -------------------------------------------------------------------\n 2 affected packages\n -------------------------------------------------------------------\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Chromium and V8. \nPlease review the CVE identifiers and release notes referenced below\nfor details. \n\nImpact\n======\n\nA local attacker could gain root privileges (CVE-2011-1444, fixed in\nchromium-11.0.696.57). The attacker also could\nobtain cookies and other sensitive information, conduct\nman-in-the-middle attacks, perform address bar spoofing, bypass the\nsame origin policy, perform Cross-Site Scripting attacks, or bypass\npop-up blocks. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Chromium users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-client/chromium-15.0.874.102\"\n\nAll V8 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/v8-3.5.10.22\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-2345\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2345\n[ 2 ] CVE-2011-2346\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2346\n[ 3 ] CVE-2011-2347\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2347\n[ 4 ] CVE-2011-2348\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2348\n[ 5 ] CVE-2011-2349\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2349\n[ 6 ] CVE-2011-2350\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2350\n[ 7 ] CVE-2011-2351\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2351\n[ 8 ] CVE-2011-2834\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2834\n[ 9 ] CVE-2011-2835\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2835\n[ 10 ] CVE-2011-2837\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2837\n[ 11 ] CVE-2011-2838\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2838\n[ 12 ] CVE-2011-2839\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2839\n[ 13 ] CVE-2011-2840\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2840\n[ 14 ] CVE-2011-2841\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2841\n[ 15 ] CVE-2011-2843\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2843\n[ 16 ] CVE-2011-2844\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2844\n[ 17 ] CVE-2011-2845\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2845\n[ 18 ] CVE-2011-2846\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2846\n[ 19 ] CVE-2011-2847\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2847\n[ 20 ] CVE-2011-2848\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2848\n[ 21 ] CVE-2011-2849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2849\n[ 22 ] CVE-2011-2850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2850\n[ 23 ] CVE-2011-2851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2851\n[ 24 ] CVE-2011-2852\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2852\n[ 25 ] CVE-2011-2853\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2853\n[ 26 ] CVE-2011-2854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2854\n[ 27 ] CVE-2011-2855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2855\n[ 28 ] CVE-2011-2856\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2856\n[ 29 ] CVE-2011-2857\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2857\n[ 30 ] CVE-2011-2858\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2858\n[ 31 ] CVE-2011-2859\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2859\n[ 32 ] CVE-2011-2860\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2860\n[ 33 ] CVE-2011-2861\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2861\n[ 34 ] CVE-2011-2862\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2862\n[ 35 ] CVE-2011-2864\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2864\n[ 36 ] CVE-2011-2874\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2874\n[ 37 ] CVE-2011-3234\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3234\n[ 38 ] CVE-2011-3873\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3873\n[ 39 ] CVE-2011-3875\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3875\n[ 40 ] CVE-2011-3876\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3876\n[ 41 ] CVE-2011-3877\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3877\n[ 42 ] CVE-2011-3878\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3878\n[ 43 ] CVE-2011-3879\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3879\n[ 44 ] CVE-2011-3880\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3880\n[ 45 ] CVE-2011-3881\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3881\n[ 46 ] CVE-2011-3882\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3882\n[ 47 ] CVE-2011-3883\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3883\n[ 48 ] CVE-2011-3884\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3884\n[ 49 ] CVE-2011-3885\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3885\n[ 50 ] CVE-2011-3886\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3886\n[ 51 ] CVE-2011-3887\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3887\n[ 52 ] CVE-2011-3888\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3888\n[ 53 ] CVE-2011-3889\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3889\n[ 54 ] CVE-2011-3890\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3890\n[ 55 ] CVE-2011-3891\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3891\n[ 56 ] Release Notes 10.0.648.127\n http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html\n[ 57 ] Release Notes 10.0.648.133\n http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html\n[ 58 ] Release Notes 10.0.648.205\n http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html\n[ 59 ] Release Notes 11.0.696.57\n http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html\n[ 60 ] Release Notes 11.0.696.65\n http://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html\n[ 61 ] Release Notes 11.0.696.68\n http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html\n[ 62 ] Release Notes 11.0.696.71\n http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html\n[ 63 ] Release Notes 12.0.742.112\n http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html\n[ 64 ] Release Notes 12.0.742.91\n http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html\n[ 65 ] Release Notes 13.0.782.107\n http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html\n[ 66 ] Release Notes 13.0.782.215\n http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html\n[ 67 ] Release Notes 13.0.782.220\n http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html\n[ 68 ] Release Notes 14.0.835.163\n http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html\n[ 69 ] Release Notes 14.0.835.202\n http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html\n[ 70 ] Release Notes 15.0.874.102\n http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html\n[ 71 ] Release Notes 8.0.552.237\n http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html\n[ 72 ] Release Notes 9.0.597.107\n http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html\n[ 73 ] Release Notes 9.0.597.84\n http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html\n[ 74 ] Release Notes 9.0.597.94\n http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201111-01.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-2834"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "PACKETSTORM",
"id": "112595"
},
{
"db": "PACKETSTORM",
"id": "114272"
},
{
"db": "PACKETSTORM",
"id": "109153"
},
{
"db": "PACKETSTORM",
"id": "108583"
},
{
"db": "PACKETSTORM",
"id": "112296"
},
{
"db": "PACKETSTORM",
"id": "108587"
},
{
"db": "PACKETSTORM",
"id": "116791"
},
{
"db": "PACKETSTORM",
"id": "106471"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-2834",
"trust": 3.4
},
{
"db": "OSVDB",
"id": "75560",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-50779",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2011-2834",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "112595",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "114272",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "109153",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "108583",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "112296",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "108587",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "116791",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106471",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "PACKETSTORM",
"id": "112595"
},
{
"db": "PACKETSTORM",
"id": "114272"
},
{
"db": "PACKETSTORM",
"id": "109153"
},
{
"db": "PACKETSTORM",
"id": "108583"
},
{
"db": "PACKETSTORM",
"id": "112296"
},
{
"db": "PACKETSTORM",
"id": "108587"
},
{
"db": "PACKETSTORM",
"id": "116791"
},
{
"db": "PACKETSTORM",
"id": "106471"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"id": "VAR-201109-0190",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-50779"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T22:37:51.059000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT5503",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5503"
},
{
"title": "HT5504",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5504"
},
{
"title": "HT5281",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5281"
},
{
"title": "HT5281",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5281?viewlocale=ja_JP"
},
{
"title": "HT5503",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5503?viewlocale=ja_JP"
},
{
"title": "HT5504",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5504?viewlocale=ja_JP"
},
{
"title": "Issue 93472",
"trust": 0.8,
"url": "https://bugs.chromium.org/p/chromium/issues/detail?id=93472"
},
{
"title": "libxml\u306e\u8106\u5f31\u6027\u3010CY12-07-002\u3011",
"trust": 0.8,
"url": "http://cs.cybozu.co.jp/information/20120730up03.php"
},
{
"title": "Google Chrome",
"trust": 0.8,
"url": "http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja\u0026hl=ja"
},
{
"title": "stable-channel-update_16",
"trust": 0.8,
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"title": "RHSA-2013:0217",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"title": "RHSA-2011:1749",
"trust": 0.8,
"url": "http://rhn.redhat.com/errata/RHSA-2011-1749.html"
},
{
"title": "Multiple Denial of Service (DoS) vulnerabilities in libxml2",
"trust": 0.8,
"url": "https://blogs.oracle.com/sunsecurity/entry/multiple_denial_of_service_dos2"
},
{
"title": "VMSA-2012-0008",
"trust": 0.8,
"url": "http://www.vmware.com/jp/support/support-resources/advisories/VMSA-2012-0008.html"
},
{
"title": "VMSA-2012-0012",
"trust": 0.8,
"url": "http://www.vmware.com/jp/support/support-resources/advisories/VMSA-2012-0012.html"
},
{
"title": "Top Page",
"trust": 0.8,
"url": "http://xmlsoft.org"
},
{
"title": "001-005914",
"trust": 0.8,
"url": "https://support.cybozu.com/ja-jp/article/5914"
},
{
"title": "nacl",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=41604"
},
{
"title": "IronPortable",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=41603"
},
{
"title": "srware_iron",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=41605"
},
{
"title": "Red Hat: Important: libxml2 security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120016 - Security Advisory"
},
{
"title": "Red Hat: Low: libxml2 security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20111749 - Security Advisory"
},
{
"title": "Red Hat: Important: libxml2 security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20120017 - Security Advisory"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2011-2834 and CVE-2011-2821",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=08c41fd83220f87661bac8ff11453ef2"
},
{
"title": "Ubuntu Security Notice: libxml2 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1334-1"
},
{
"title": "Debian CVElist Bug Report Logs: libxml2: [PATCH] fix for CVE-2011-3919",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=dbb2dba1be28bdb99afde6354fbc441a"
},
{
"title": "Debian CVElist Bug Report Logs: Two security issues",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=56ba5418d99f002c70ec3a0604e1b829"
},
{
"title": "VMware Security Advisories: VMware ESXi update to third party library",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=329050bc1ed5b6a8ba43ca82aa2c2690"
},
{
"title": "VMware Security Advisories: VMware ESX updates to ESX Service Console",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=1459f8d3f5c5308900d206366452e07d"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-415",
"trust": 1.1
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html"
},
{
"trust": 1.8,
"url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00003.html"
},
{
"trust": 1.8,
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"trust": 1.8,
"url": "http://support.apple.com/kb/ht5281"
},
{
"trust": 1.8,
"url": "http://support.apple.com/kb/ht5503"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2012/dsa-2394"
},
{
"trust": 1.8,
"url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041"
},
{
"trust": 1.8,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:145"
},
{
"trust": 1.8,
"url": "http://osvdb.org/75560"
},
{
"trust": 1.8,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14410"
},
{
"trust": 1.8,
"url": "http://www.redhat.com/support/errata/rhsa-2011-1749.html"
},
{
"trust": 1.8,
"url": "http://rhn.redhat.com/errata/rhsa-2013-0217.html"
},
{
"trust": 1.8,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"trust": 0.9,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2834"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu692779/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu624491/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2834"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3919"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1944"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2821"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0216"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3905"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1167"
},
{
"trust": 0.2,
"url": "http://support.apple.com/kb/ht1222"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885"
},
{
"trust": 0.2,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3919.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/kb/docs/doc-11259"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-2834.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-0216.html"
},
{
"trust": 0.2,
"url": "http://bugzilla.redhat.com/):"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-3905.html"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-4008"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2845"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/415.html"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/google-chrome-cve-2011-2834"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2012:0016"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/1334-1/"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2011-1749"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=24161"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0658"
},
{
"trust": 0.1,
"url": "http://www.php.net"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1005"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0651"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0656"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0642"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0655"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0657"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0649"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2692"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0652"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1004"
},
{
"trust": 0.1,
"url": "http://support.apple.com/kb/ts4272"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2895"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0241"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1777"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4566"
},
{
"trust": 0.1,
"url": "http://www.libpng.org/pub/png/libpng.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4815"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1778"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3212"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0654"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3328"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2016"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0057"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4078"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0031"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1165"
},
{
"trust": 0.1,
"url": "http://h20566.www2.hp.com/portal/site/hpsc/template.page/public/psi/swddetail"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4317"
},
{
"trust": 0.1,
"url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.1,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2014"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4108"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2013"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4415"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4577"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3607"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4619"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0021"
},
{
"trust": 0.1,
"url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0027"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0053"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2012"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-2015"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3379"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4576"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2012-0016.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4348"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3905"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0028"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1944"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/1055"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-0028"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4348"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3191"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3919"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/security_response.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3191"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0216"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos.html"
},
{
"trust": 0.1,
"url": "http://kb.vmware.com/kb/2013057"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4008"
},
{
"trust": 0.1,
"url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
},
{
"trust": 0.1,
"url": "http://www.vmware.com/support/policies/eos_vi.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2011-1944.html"
},
{
"trust": 0.1,
"url": "https://rhn.redhat.com/errata/rhsa-2012-0017.html"
},
{
"trust": 0.1,
"url": "https://www.redhat.com/security/data/cve/cve-2010-4008.html"
},
{
"trust": 0.1,
"url": "https://www.apple.com/itunes/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3059"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3067"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3048"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3035"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3027"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3050"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3016"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3060"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3038"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3036"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3064"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3043"
},
{
"trust": 0.1,
"url": "http://www.freetype.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3041"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3021"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3032"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3040"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3044"
},
{
"trust": 0.1,
"url": "http://gpgtools.org"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3037"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3026"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3053"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3034"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3042"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-3039"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2849"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2841"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2351"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2847"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3875"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3890"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2350"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3884"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2848"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2853"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2835"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2837"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3879"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3888"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2859"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3881"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3889"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2351"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2844"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2843"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3876"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2844"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2345"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2837"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2853"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3877"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/04/chrome-stable-update.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2349"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3880"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-201111-01.xml"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2347"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2841"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2835"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2349"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2861"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2862"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2852"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2838"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2839"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2849"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2346"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/05/stable-channel-update_24.html"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_28.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2858"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3891"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2855"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3887"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/06/stable-channel-update_28.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3878"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3873"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2840"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2847"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2854"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2855"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2850"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/05/beta-and-stable-channel-update.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2838"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2834"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/06/chrome-stable-release.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3883"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2851"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2840"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2857"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2851"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2856"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2346"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2347"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2846"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2348"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2850"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2852"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2856"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2874"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2348"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2864"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2350"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2345"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2860"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3234"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2845"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2848"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3886"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/08/stable-channel-update.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2839"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3882"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2854"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3885"
},
{
"trust": 0.1,
"url": "http://googlechromereleases.blogspot.com/2011/02/stable-channel-update_08.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2843"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2846"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "PACKETSTORM",
"id": "112595"
},
{
"db": "PACKETSTORM",
"id": "114272"
},
{
"db": "PACKETSTORM",
"id": "109153"
},
{
"db": "PACKETSTORM",
"id": "108583"
},
{
"db": "PACKETSTORM",
"id": "112296"
},
{
"db": "PACKETSTORM",
"id": "108587"
},
{
"db": "PACKETSTORM",
"id": "116791"
},
{
"db": "PACKETSTORM",
"id": "106471"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-50779"
},
{
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"db": "PACKETSTORM",
"id": "112595"
},
{
"db": "PACKETSTORM",
"id": "114272"
},
{
"db": "PACKETSTORM",
"id": "109153"
},
{
"db": "PACKETSTORM",
"id": "108583"
},
{
"db": "PACKETSTORM",
"id": "112296"
},
{
"db": "PACKETSTORM",
"id": "108587"
},
{
"db": "PACKETSTORM",
"id": "116791"
},
{
"db": "PACKETSTORM",
"id": "106471"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-09-19T00:00:00",
"db": "VULHUB",
"id": "VHN-50779"
},
{
"date": "2011-09-19T00:00:00",
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"date": "2012-05-10T15:19:38",
"db": "PACKETSTORM",
"id": "112595"
},
{
"date": "2012-06-28T03:39:12",
"db": "PACKETSTORM",
"id": "114272"
},
{
"date": "2012-01-27T15:44:58",
"db": "PACKETSTORM",
"id": "109153"
},
{
"date": "2012-01-12T03:08:33",
"db": "PACKETSTORM",
"id": "108583"
},
{
"date": "2012-04-27T20:42:35",
"db": "PACKETSTORM",
"id": "112296"
},
{
"date": "2012-01-12T03:12:29",
"db": "PACKETSTORM",
"id": "108587"
},
{
"date": "2012-09-22T06:24:25",
"db": "PACKETSTORM",
"id": "116791"
},
{
"date": "2011-11-01T15:58:39",
"db": "PACKETSTORM",
"id": "106471"
},
{
"date": "2011-09-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"date": "2011-11-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"date": "2011-09-19T12:02:55.620000",
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-05-08T00:00:00",
"db": "VULHUB",
"id": "VHN-50779"
},
{
"date": "2020-05-08T00:00:00",
"db": "VULMON",
"id": "CVE-2011-2834"
},
{
"date": "2020-05-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201109-684"
},
{
"date": "2016-06-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-002637"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2011-2834"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "108583"
},
{
"db": "PACKETSTORM",
"id": "108587"
},
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
}
],
"trust": 0.8
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "libxml2 Memory double open vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-002637"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201109-684"
}
],
"trust": 0.6
}
}
RHSA-2012:0016
Vulnerability from csaf_redhat - Published: 2012-01-11 17:43 - Updated: 2026-01-08 09:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libxml2 packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation\nof various XML standards. One of those standards is the XML Path Language\n(XPath), which is a language for addressing parts of an XML document.\n\nA heap-based buffer overflow flaw was found in the way libxml2 decoded\nentity references with long names. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-3919)\n\nAn off-by-one error, leading to a heap-based buffer overflow, was found in\nthe way libxml2 parsed certain XML files. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0216)\n\nA flaw was found in the way libxml2 parsed certain XPath expressions. If an\nattacker were able to supply a specially-crafted XML file to an application\nusing libxml2, as well as an XPath expression for that application to run\nagainst the crafted file, it could cause the application to crash.\n(CVE-2011-2834)\n\nNote: Red Hat does not ship any applications that use libxml2 in a way that\nwould allow the CVE-2011-2834 flaw to be exploited; however, third-party\napplications may allow XPath expressions to be passed which could trigger\nthis flaw.\n\nAn out-of-bounds memory read flaw was found in libxml2. A remote attacker\ncould provide a specially-crafted XML file that, when opened in an\napplication linked against libxml2, would cause the application to crash.\n(CVE-2011-3905)\n\nAll users of libxml2 are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The desktop must\nbe restarted (log out, then log back in) for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0016",
"url": "https://access.redhat.com/errata/RHSA-2012:0016"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0016.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2026-01-08T09:34:48+00:00",
"generator": {
"date": "2026-01-08T09:34:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2012:0016",
"initial_release_date": "2012-01-11T17:43:00+00:00",
"revision_history": [
{
"date": "2012-01-11T17:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-11T17:47:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T09:34:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.ia64",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.ia64",
"product_id": "libxml2-devel-0:2.6.16-12.9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.ia64",
"product": {
"name": "libxml2-0:2.6.16-12.9.ia64",
"product_id": "libxml2-0:2.6.16-12.9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.ia64",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.ia64",
"product_id": "libxml2-python-0:2.6.16-12.9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.i386",
"product": {
"name": "libxml2-0:2.6.16-12.9.i386",
"product_id": "libxml2-0:2.6.16-12.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.i386",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.i386",
"product_id": "libxml2-devel-0:2.6.16-12.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.i386",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.i386",
"product_id": "libxml2-python-0:2.6.16-12.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.x86_64",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.x86_64",
"product_id": "libxml2-devel-0:2.6.16-12.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.x86_64",
"product": {
"name": "libxml2-0:2.6.16-12.9.x86_64",
"product_id": "libxml2-0:2.6.16-12.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.x86_64",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.x86_64",
"product_id": "libxml2-python-0:2.6.16-12.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.src",
"product": {
"name": "libxml2-0:2.6.16-12.9.src",
"product_id": "libxml2-0:2.6.16-12.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.ppc",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.ppc",
"product_id": "libxml2-devel-0:2.6.16-12.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.ppc",
"product": {
"name": "libxml2-0:2.6.16-12.9.ppc",
"product_id": "libxml2-0:2.6.16-12.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.ppc",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.ppc",
"product_id": "libxml2-python-0:2.6.16-12.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.ppc64",
"product": {
"name": "libxml2-0:2.6.16-12.9.ppc64",
"product_id": "libxml2-0:2.6.16-12.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.s390x",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.s390x",
"product_id": "libxml2-devel-0:2.6.16-12.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.s390x",
"product": {
"name": "libxml2-0:2.6.16-12.9.s390x",
"product_id": "libxml2-0:2.6.16-12.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.s390x",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.s390x",
"product_id": "libxml2-python-0:2.6.16-12.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"product": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"product_id": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.16-12.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.16-12.9.s390",
"product": {
"name": "libxml2-0:2.6.16-12.9.s390",
"product_id": "libxml2-0:2.6.16-12.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.16-12.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.16-12.9.s390",
"product": {
"name": "libxml2-devel-0:2.6.16-12.9.s390",
"product_id": "libxml2-devel-0:2.6.16-12.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.16-12.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.16-12.9.s390",
"product": {
"name": "libxml2-python-0:2.6.16-12.9.s390",
"product_id": "libxml2-python-0:2.6.16-12.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.16-12.9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.src"
},
"product_reference": "libxml2-0:2.6.16-12.9.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-devel-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:libxml2-python-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.src"
},
"product_reference": "libxml2-0:2.6.16-12.9.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:libxml2-python-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.src"
},
"product_reference": "libxml2-0:2.6.16-12.9.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-devel-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:libxml2-python-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.src"
},
"product_reference": "libxml2-0:2.6.16-12.9.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-devel-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.i386"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.ia64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.ppc"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.s390"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.s390x"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.16-12.9.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:libxml2-python-0:2.6.16-12.9.x86_64"
},
"product_reference": "libxml2-python-0:2.6.16-12.9.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2011-0216",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "724906"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0216"
},
{
"category": "external",
"summary": "RHBZ#724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216"
}
],
"release_date": "2011-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0016"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding"
},
{
"cve": "CVE-2011-2834",
"discovery_date": "2011-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735751"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2834"
},
{
"category": "external",
"summary": "RHBZ#735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834"
}
],
"release_date": "2011-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0016"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free caused by malformed XPath expression in XSLT"
},
{
"cve": "CVE-2011-3905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2011-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "767387"
}
],
"notes": [
{
"category": "description",
"text": "libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2 out of bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of libxml2 as shipped with Red Hat Enterprise\nLinux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and\nRHSA-2012:0018 respectively. This issue affects the version of mingw32-libxml2\nas shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team\nhas rated this issue as having low security impact. A future update may address\nthis issue in Red Hat Enterprise Linux 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3905"
},
{
"category": "external",
"summary": "RHBZ#767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905"
}
],
"release_date": "2011-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0016"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2 out of bounds read"
},
{
"cve": "CVE-2011-3919",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2012-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771896"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3919"
},
{
"category": "external",
"summary": "RHBZ#771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919"
}
],
"release_date": "2012-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0016"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:libxml2-0:2.6.16-12.9.i386",
"4AS:libxml2-0:2.6.16-12.9.ia64",
"4AS:libxml2-0:2.6.16-12.9.ppc",
"4AS:libxml2-0:2.6.16-12.9.ppc64",
"4AS:libxml2-0:2.6.16-12.9.s390",
"4AS:libxml2-0:2.6.16-12.9.s390x",
"4AS:libxml2-0:2.6.16-12.9.src",
"4AS:libxml2-0:2.6.16-12.9.x86_64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4AS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4AS:libxml2-devel-0:2.6.16-12.9.i386",
"4AS:libxml2-devel-0:2.6.16-12.9.ia64",
"4AS:libxml2-devel-0:2.6.16-12.9.ppc",
"4AS:libxml2-devel-0:2.6.16-12.9.s390",
"4AS:libxml2-devel-0:2.6.16-12.9.s390x",
"4AS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4AS:libxml2-python-0:2.6.16-12.9.i386",
"4AS:libxml2-python-0:2.6.16-12.9.ia64",
"4AS:libxml2-python-0:2.6.16-12.9.ppc",
"4AS:libxml2-python-0:2.6.16-12.9.s390",
"4AS:libxml2-python-0:2.6.16-12.9.s390x",
"4AS:libxml2-python-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-0:2.6.16-12.9.i386",
"4Desktop:libxml2-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-0:2.6.16-12.9.s390",
"4Desktop:libxml2-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-0:2.6.16-12.9.src",
"4Desktop:libxml2-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.i386",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-devel-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390",
"4Desktop:libxml2-devel-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-devel-0:2.6.16-12.9.x86_64",
"4Desktop:libxml2-python-0:2.6.16-12.9.i386",
"4Desktop:libxml2-python-0:2.6.16-12.9.ia64",
"4Desktop:libxml2-python-0:2.6.16-12.9.ppc",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390",
"4Desktop:libxml2-python-0:2.6.16-12.9.s390x",
"4Desktop:libxml2-python-0:2.6.16-12.9.x86_64",
"4ES:libxml2-0:2.6.16-12.9.i386",
"4ES:libxml2-0:2.6.16-12.9.ia64",
"4ES:libxml2-0:2.6.16-12.9.ppc",
"4ES:libxml2-0:2.6.16-12.9.ppc64",
"4ES:libxml2-0:2.6.16-12.9.s390",
"4ES:libxml2-0:2.6.16-12.9.s390x",
"4ES:libxml2-0:2.6.16-12.9.src",
"4ES:libxml2-0:2.6.16-12.9.x86_64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4ES:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4ES:libxml2-devel-0:2.6.16-12.9.i386",
"4ES:libxml2-devel-0:2.6.16-12.9.ia64",
"4ES:libxml2-devel-0:2.6.16-12.9.ppc",
"4ES:libxml2-devel-0:2.6.16-12.9.s390",
"4ES:libxml2-devel-0:2.6.16-12.9.s390x",
"4ES:libxml2-devel-0:2.6.16-12.9.x86_64",
"4ES:libxml2-python-0:2.6.16-12.9.i386",
"4ES:libxml2-python-0:2.6.16-12.9.ia64",
"4ES:libxml2-python-0:2.6.16-12.9.ppc",
"4ES:libxml2-python-0:2.6.16-12.9.s390",
"4ES:libxml2-python-0:2.6.16-12.9.s390x",
"4ES:libxml2-python-0:2.6.16-12.9.x86_64",
"4WS:libxml2-0:2.6.16-12.9.i386",
"4WS:libxml2-0:2.6.16-12.9.ia64",
"4WS:libxml2-0:2.6.16-12.9.ppc",
"4WS:libxml2-0:2.6.16-12.9.ppc64",
"4WS:libxml2-0:2.6.16-12.9.s390",
"4WS:libxml2-0:2.6.16-12.9.s390x",
"4WS:libxml2-0:2.6.16-12.9.src",
"4WS:libxml2-0:2.6.16-12.9.x86_64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.i386",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ia64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.ppc64",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.s390x",
"4WS:libxml2-debuginfo-0:2.6.16-12.9.x86_64",
"4WS:libxml2-devel-0:2.6.16-12.9.i386",
"4WS:libxml2-devel-0:2.6.16-12.9.ia64",
"4WS:libxml2-devel-0:2.6.16-12.9.ppc",
"4WS:libxml2-devel-0:2.6.16-12.9.s390",
"4WS:libxml2-devel-0:2.6.16-12.9.s390x",
"4WS:libxml2-devel-0:2.6.16-12.9.x86_64",
"4WS:libxml2-python-0:2.6.16-12.9.i386",
"4WS:libxml2-python-0:2.6.16-12.9.ia64",
"4WS:libxml2-python-0:2.6.16-12.9.ppc",
"4WS:libxml2-python-0:2.6.16-12.9.s390",
"4WS:libxml2-python-0:2.6.16-12.9.s390x",
"4WS:libxml2-python-0:2.6.16-12.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name"
}
]
}
RHSA-2011:1749
Vulnerability from csaf_redhat - Published: 2011-12-05 19:54 - Updated: 2026-01-08 09:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libxml2 packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation\nof various XML standards. One of those standards is the XML Path Language\n(XPath), which is a language for addressing parts of an XML document.\n\nAn off-by-one error, leading to a heap-based buffer overflow, was found in\nthe way libxml2 parsed certain XML files. A remote attacker could provide\na specially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0216)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way libxml2 parsed certain XPath expressions. If an attacker\nwere able to supply a specially-crafted XML file to an application using\nlibxml2, as well as an XPath expression for that application to run against\nthe crafted file, it could cause the application to crash or, possibly,\nexecute arbitrary code. (CVE-2011-1944)\n\nMultiple flaws were found in the way libxml2 parsed certain XPath\nexpressions. If an attacker were able to supply a specially-crafted XML\nfile to an application using libxml2, as well as an XPath expression for\nthat application to run against the crafted file, it could cause the\napplication to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821,\nCVE-2011-2834)\n\nNote: Red Hat does not ship any applications that use libxml2 in a way that\nwould allow the CVE-2011-1944, CVE-2010-4008, CVE-2010-4494, CVE-2011-2821,\nand CVE-2011-2834 flaws to be exploited; however, third-party applications\nmay allow XPath expressions to be passed which could trigger these flaws.\n\nRed Hat would like to thank the Google Security Team for reporting the\nCVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the\noriginal reporter of CVE-2010-4008.\n\nThis update also fixes the following bugs:\n\n* A number of patches have been applied to harden the XPath processing code\nin libxml2, such as fixing memory leaks, rounding errors, XPath numbers\nevaluations, and a potential error in encoding conversion. (BZ#732335)\n\nAll users of libxml2 are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The desktop must\nbe restarted (log out, then log back in) for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1749",
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "665963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665963"
},
{
"category": "external",
"summary": "709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "732335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=732335"
},
{
"category": "external",
"summary": "735712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735712"
},
{
"category": "external",
"summary": "735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1749.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security and bug fix update",
"tracking": {
"current_release_date": "2026-01-08T09:34:45+00:00",
"generator": {
"date": "2026-01-08T09:34:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2011:1749",
"initial_release_date": "2011-12-05T19:54:00+00:00",
"revision_history": [
{
"date": "2011-12-05T19:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-05T20:01:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T09:34:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-static-0:2.7.6-4.el6.i686",
"product": {
"name": "libxml2-static-0:2.7.6-4.el6.i686",
"product_id": "libxml2-static-0:2.7.6-4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.7.6-4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.i686",
"product": {
"name": "libxml2-0:2.7.6-4.el6.i686",
"product_id": "libxml2-0:2.7.6-4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.7.6-4.el6.i686",
"product": {
"name": "libxml2-python-0:2.7.6-4.el6.i686",
"product_id": "libxml2-python-0:2.7.6-4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.7.6-4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.i686",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686",
"product_id": "libxml2-devel-0:2.7.6-4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-static-0:2.7.6-4.el6.ppc64",
"product": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64",
"product_id": "libxml2-static-0:2.7.6-4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.7.6-4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.7.6-4.el6.ppc64",
"product": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64",
"product_id": "libxml2-python-0:2.7.6-4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.7.6-4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"product_id": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.ppc64",
"product": {
"name": "libxml2-0:2.7.6-4.el6.ppc64",
"product_id": "libxml2-0:2.7.6-4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-static-0:2.7.6-4.el6.s390x",
"product": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x",
"product_id": "libxml2-static-0:2.7.6-4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.7.6-4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.7.6-4.el6.s390x",
"product": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x",
"product_id": "libxml2-python-0:2.7.6-4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.7.6-4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.s390x",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x",
"product_id": "libxml2-devel-0:2.7.6-4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.s390x",
"product": {
"name": "libxml2-0:2.7.6-4.el6.s390x",
"product_id": "libxml2-0:2.7.6-4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-static-0:2.7.6-4.el6.x86_64",
"product": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64",
"product_id": "libxml2-static-0:2.7.6-4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.7.6-4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.7.6-4.el6.x86_64",
"product": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64",
"product_id": "libxml2-python-0:2.7.6-4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.7.6-4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.x86_64",
"product": {
"name": "libxml2-0:2.7.6-4.el6.x86_64",
"product_id": "libxml2-0:2.7.6-4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"product_id": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.src",
"product": {
"name": "libxml2-0:2.7.6-4.el6.src",
"product_id": "libxml2-0:2.7.6-4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.ppc",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc",
"product_id": "libxml2-devel-0:2.7.6-4.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.ppc",
"product": {
"name": "libxml2-0:2.7.6-4.el6.ppc",
"product_id": "libxml2-0:2.7.6-4.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.7.6-4.el6.s390",
"product": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390",
"product_id": "libxml2-devel-0:2.7.6-4.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-4.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"product": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"product_id": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-4.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.7.6-4.el6.s390",
"product": {
"name": "libxml2-0:2.7.6-4.el6.s390",
"product_id": "libxml2-0:2.7.6-4.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.7.6-4.el6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.src"
},
"product_reference": "libxml2-0:2.7.6-4.el6.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.s390"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-devel-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-python-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-python-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-python-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-static-0:2.7.6-4.el6.i686"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-static-0:2.7.6-4.el6.s390x"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.7.6-4.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
},
"product_reference": "libxml2-static-0:2.7.6-4.el6.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Security Team"
]
},
{
"names": [
"Bui Quang Minh"
],
"organization": "Bkis",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2010-4008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2010-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "645341"
}
],
"notes": [
{
"category": "description",
"text": "libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of libxml and libxml2 as shipped with Red Hat Enterprise Linux 3, and it did not affect the version of libxml2 as shipped with Red Hat Enterprise Linux 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4008"
},
{
"category": "external",
"summary": "RHBZ#645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008"
}
],
"release_date": "2010-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis"
},
{
"cve": "CVE-2010-4494",
"discovery_date": "2010-12-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "665963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free in XPath processing code",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of libxml and libxml2 as shipped with\nRed Hat Enterprise Linux 3, and it did not affect the version of libxml2 as\nshipped with Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4494"
},
{
"category": "external",
"summary": "RHBZ#665963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4494"
}
],
"release_date": "2010-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free in XPath processing code"
},
{
"cve": "CVE-2011-0216",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "724906"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0216"
},
{
"category": "external",
"summary": "RHBZ#724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216"
}
],
"release_date": "2011-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding"
},
{
"cve": "CVE-2011-1944",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "709747"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1944"
},
{
"category": "external",
"summary": "RHBZ#709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944"
}
],
"release_date": "2011-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets"
},
{
"cve": "CVE-2011-2821",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2011-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735712"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the version of libxml2 package as shipped with Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2821"
},
{
"category": "external",
"summary": "RHBZ#735712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2821"
}
],
"release_date": "2011-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double free caused by malformed XPath expression in XSLT"
},
{
"cve": "CVE-2011-2834",
"discovery_date": "2011-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735751"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2834"
},
{
"category": "external",
"summary": "RHBZ#735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834"
}
],
"release_date": "2011-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-05T19:54:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1749"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libxml2-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-0:2.7.6-4.el6.src",
"6Client-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-0:2.7.6-4.el6.i686",
"6Client:libxml2-0:2.7.6-4.el6.ppc",
"6Client:libxml2-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-0:2.7.6-4.el6.s390",
"6Client:libxml2-0:2.7.6-4.el6.s390x",
"6Client:libxml2-0:2.7.6-4.el6.src",
"6Client:libxml2-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Client:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-devel-0:2.7.6-4.el6.i686",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Client:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390",
"6Client:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Client:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-python-0:2.7.6-4.el6.i686",
"6Client:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-python-0:2.7.6-4.el6.s390x",
"6Client:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Client:libxml2-static-0:2.7.6-4.el6.i686",
"6Client:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Client:libxml2-static-0:2.7.6-4.el6.s390x",
"6Client:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-0:2.7.6-4.el6.src",
"6ComputeNode:libxml2-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-python-0:2.7.6-4.el6.x86_64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.i686",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.ppc64",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.s390x",
"6ComputeNode:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-0:2.7.6-4.el6.src",
"6Server-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-0:2.7.6-4.el6.i686",
"6Server:libxml2-0:2.7.6-4.el6.ppc",
"6Server:libxml2-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-0:2.7.6-4.el6.s390",
"6Server:libxml2-0:2.7.6-4.el6.s390x",
"6Server:libxml2-0:2.7.6-4.el6.src",
"6Server:libxml2-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Server:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-devel-0:2.7.6-4.el6.i686",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Server:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390",
"6Server:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Server:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-python-0:2.7.6-4.el6.i686",
"6Server:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-python-0:2.7.6-4.el6.s390x",
"6Server:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Server:libxml2-static-0:2.7.6-4.el6.i686",
"6Server:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Server:libxml2-static-0:2.7.6-4.el6.s390x",
"6Server:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.src",
"6Workstation-optional:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation-optional:libxml2-static-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-0:2.7.6-4.el6.src",
"6Workstation:libxml2-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-debuginfo-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-devel-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-python-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-python-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-python-0:2.7.6-4.el6.x86_64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.i686",
"6Workstation:libxml2-static-0:2.7.6-4.el6.ppc64",
"6Workstation:libxml2-static-0:2.7.6-4.el6.s390x",
"6Workstation:libxml2-static-0:2.7.6-4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free caused by malformed XPath expression in XSLT"
}
]
}
RHSA-2012:0017
Vulnerability from csaf_redhat - Published: 2012-01-11 17:43 - Updated: 2026-01-08 09:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libxml2 packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation\nof various XML standards. One of those standards is the XML Path Language\n(XPath), which is a language for addressing parts of an XML document.\n\nA heap-based buffer overflow flaw was found in the way libxml2 decoded\nentity references with long names. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-3919)\n\nAn off-by-one error, leading to a heap-based buffer overflow, was found in\nthe way libxml2 parsed certain XML files. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-0216)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way libxml2 parsed certain XPath expressions. If an attacker\nwere able to supply a specially-crafted XML file to an application using\nlibxml2, as well as an XPath expression for that application to run against\nthe crafted file, it could cause the application to crash or, possibly,\nexecute arbitrary code. (CVE-2011-1944)\n\nFlaws were found in the way libxml2 parsed certain XPath expressions. If an\nattacker were able to supply a specially-crafted XML file to an application\nusing libxml2, as well as an XPath expression for that application to run\nagainst the crafted file, it could cause the application to crash.\n(CVE-2010-4008, CVE-2011-2834)\n\nAn out-of-bounds memory read flaw was found in libxml2. A remote attacker\ncould provide a specially-crafted XML file that, when opened in an\napplication linked against libxml2, would cause the application to crash.\n(CVE-2011-3905)\n\nNote: Red Hat does not ship any applications that use libxml2 in a way that\nwould allow the CVE-2011-1944, CVE-2010-4008, and CVE-2011-2834 flaws to be\nexploited; however, third-party applications may allow XPath expressions to\nbe passed which could trigger these flaws.\n\nRed Hat would like to thank the Google Security Team for reporting the\nCVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the\noriginal reporter of CVE-2010-4008.\n\nAll users of libxml2 are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. The desktop must\nbe restarted (log out, then log back in) for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0017",
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0017.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2026-01-08T09:34:47+00:00",
"generator": {
"date": "2026-01-08T09:34:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2012:0017",
"initial_release_date": "2012-01-11T17:43:00+00:00",
"revision_history": [
{
"date": "2012-01-11T17:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-01-11T17:45:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T09:34:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"product": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"product_id": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.12.el5_7.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_id": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.12.el5_7.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"product": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_id": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.12.el5_7.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"product": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_id": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.12.el5_7.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"product": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_id": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.12.el5_7.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"product": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"product_id": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.12.el5_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"product": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"product_id": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.12.el5_7.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"product": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"product_id": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.12.el5_7.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
},
"product_reference": "libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Security Team"
]
},
{
"names": [
"Bui Quang Minh"
],
"organization": "Bkis",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2010-4008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2010-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "645341"
}
],
"notes": [
{
"category": "description",
"text": "libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of libxml and libxml2 as shipped with Red Hat Enterprise Linux 3, and it did not affect the version of libxml2 as shipped with Red Hat Enterprise Linux 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4008"
},
{
"category": "external",
"summary": "RHBZ#645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008"
}
],
"release_date": "2010-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis"
},
{
"cve": "CVE-2011-0216",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "724906"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0216"
},
{
"category": "external",
"summary": "RHBZ#724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216"
}
],
"release_date": "2011-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding"
},
{
"cve": "CVE-2011-1944",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "709747"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1944"
},
{
"category": "external",
"summary": "RHBZ#709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944"
}
],
"release_date": "2011-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets"
},
{
"cve": "CVE-2011-2834",
"discovery_date": "2011-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735751"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2834"
},
{
"category": "external",
"summary": "RHBZ#735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834"
}
],
"release_date": "2011-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free caused by malformed XPath expression in XSLT"
},
{
"cve": "CVE-2011-3905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2011-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "767387"
}
],
"notes": [
{
"category": "description",
"text": "libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2 out of bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of libxml2 as shipped with Red Hat Enterprise\nLinux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and\nRHSA-2012:0018 respectively. This issue affects the version of mingw32-libxml2\nas shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team\nhas rated this issue as having low security impact. A future update may address\nthis issue in Red Hat Enterprise Linux 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3905"
},
{
"category": "external",
"summary": "RHBZ#767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905"
}
],
"release_date": "2011-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2 out of bounds read"
},
{
"cve": "CVE-2011-3919",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2012-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771896"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3919"
},
{
"category": "external",
"summary": "RHBZ#771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919"
}
],
"release_date": "2012-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-01-11T17:43:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0017"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Client-Workstation-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Client-Workstation-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.src",
"5Server-5.7.Z:libxml2-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-debuginfo-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.ppc64",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-devel-0:2.6.26-2.1.12.el5_7.2.x86_64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.i386",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ia64",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.ppc",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.s390x",
"5Server-5.7.Z:libxml2-python-0:2.6.26-2.1.12.el5_7.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name"
}
]
}
RHSA-2013:0217
Vulnerability from csaf_redhat - Published: 2013-01-31 19:14 - Updated: 2026-01-08 09:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated mingw32-libxml2 packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 6. This advisory also contains\ninformation about future updates for the mingw32 packages, as well as the\ndeprecation of the packages with the release of Red Hat\nEnterprise Linux 6.4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the libxml2 library, a development toolbox providing\nthe implementation of various XML standards, for users of MinGW (Minimalist\nGNU for Windows).\n\nIMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no\nlonger be updated proactively and will be deprecated with the release of\nRed Hat Enterprise Linux 6.4. These packages were provided to support other\ncapabilities in Red Hat Enterprise Linux and were not intended for direct\ncustomer use. Customers are advised to not use these packages with\nimmediate effect. Future updates to these packages will be at Red Hat\u0027s\ndiscretion and these packages may be removed in a future minor release.\n\nA heap-based buffer overflow flaw was found in the way libxml2 decoded\nentity references with long names. A remote attacker could provide a\nspecially-crafted XML file that, when opened in an application linked\nagainst libxml2, would cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication. (CVE-2011-3919)\n\nA heap-based buffer underflow flaw was found in the way libxml2 decoded\ncertain entities. A remote attacker could provide a specially-crafted XML\nfile that, when opened in an application linked against libxml2, would\ncause the application to crash or, potentially, execute arbitrary code with\nthe privileges of the user running the application. (CVE-2012-5134)\n\nIt was found that the hashing routine used by libxml2 arrays was\nsusceptible to predictable hash collisions. Sending a specially-crafted\nmessage to an XML service could result in longer processing time, which\ncould lead to a denial of service. To mitigate this issue, randomization\nhas been added to the hashing function to reduce the chance of an attacker\nsuccessfully causing intentional collisions. (CVE-2012-0841)\n\nMultiple flaws were found in the way libxml2 parsed certain XPath (XML Path\nLanguage) expressions. If an attacker were able to supply a\nspecially-crafted XML file to an application using libxml2, as well as an\nXPath expression for that application to run against the crafted file, it\ncould cause the application to crash. (CVE-2010-4008, CVE-2010-4494,\nCVE-2011-2821, CVE-2011-2834)\n\nTwo heap-based buffer overflow flaws were found in the way libxml2 decoded\ncertain XML files. A remote attacker could provide a specially-crafted XML\nfile that, when opened in an application linked against libxml2, would\ncause the application to crash or, potentially, execute arbitrary code with\nthe privileges of the user running the application. (CVE-2011-0216,\nCVE-2011-3102)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way libxml2 parsed certain XPath expressions. If an attacker\nwere able to supply a specially-crafted XML file to an application using\nlibxml2, as well as an XPath expression for that application to run against\nthe crafted file, it could cause the application to crash or, possibly,\nexecute arbitrary code. (CVE-2011-1944)\n\nAn out-of-bounds memory read flaw was found in libxml2. A remote attacker\ncould provide a specially-crafted XML file that, when opened in an\napplication linked against libxml2, would cause the application to crash.\n(CVE-2011-3905)\n\nRed Hat would like to thank the Google Security Team for reporting the\nCVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the\noriginal reporter of CVE-2010-4008.\n\nAll users of mingw32-libxml2 are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0217",
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "665963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665963"
},
{
"category": "external",
"summary": "709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "735712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735712"
},
{
"category": "external",
"summary": "735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "external",
"summary": "787067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787067"
},
{
"category": "external",
"summary": "822109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=822109"
},
{
"category": "external",
"summary": "880466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880466"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0217.json"
}
],
"title": "Red Hat Security Advisory: mingw32-libxml2 security update",
"tracking": {
"current_release_date": "2026-01-08T09:34:54+00:00",
"generator": {
"date": "2026-01-08T09:34:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2013:0217",
"initial_release_date": "2013-01-31T19:14:00+00:00",
"revision_history": [
{
"date": "2013-01-31T19:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-01-31T19:25:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T09:34:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.3.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"product": {
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"product_id": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mingw32-libxml2-static@2.7.6-6.el6_3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"product": {
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"product_id": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mingw32-libxml2-debuginfo@2.7.6-6.el6_3?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"product": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"product_id": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mingw32-libxml2@2.7.6-6.el6_3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"product": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"product_id": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mingw32-libxml2@2.7.6-6.el6_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Client-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"relates_to_product_reference": "6Client-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Client-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Client-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Server-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"relates_to_product_reference": "6Server-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Server-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Server-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Workstation-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-0:2.7.6-6.el6_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src"
},
"product_reference": "mingw32-libxml2-0:2.7.6-6.el6_3.src",
"relates_to_product_reference": "6Workstation-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Workstation-optional-6.3.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
},
"product_reference": "mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"relates_to_product_reference": "6Workstation-optional-6.3.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Security Team"
]
},
{
"names": [
"Bui Quang Minh"
],
"organization": "Bkis",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2010-4008",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2010-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "645341"
}
],
"notes": [
{
"category": "description",
"text": "libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of libxml and libxml2 as shipped with Red Hat Enterprise Linux 3, and it did not affect the version of libxml2 as shipped with Red Hat Enterprise Linux 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4008"
},
{
"category": "external",
"summary": "RHBZ#645341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=645341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4008"
}
],
"release_date": "2010-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis"
},
{
"cve": "CVE-2010-4494",
"discovery_date": "2010-12-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "665963"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free in XPath processing code",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of libxml and libxml2 as shipped with\nRed Hat Enterprise Linux 3, and it did not affect the version of libxml2 as\nshipped with Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-4494"
},
{
"category": "external",
"summary": "RHBZ#665963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=665963"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4494",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4494"
}
],
"release_date": "2010-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free in XPath processing code"
},
{
"cve": "CVE-2011-0216",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "724906"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0216"
},
{
"category": "external",
"summary": "RHBZ#724906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=724906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0216"
}
],
"release_date": "2011-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Off-by-one error leading to heap-based buffer overflow in encoding"
},
{
"cve": "CVE-2011-1944",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "709747"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1944"
},
{
"category": "external",
"summary": "RHBZ#709747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1944"
}
],
"release_date": "2011-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets"
},
{
"cve": "CVE-2011-2821",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2011-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735712"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the version of libxml2 package as shipped with Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2821"
},
{
"category": "external",
"summary": "RHBZ#735712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2821",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2821"
}
],
"release_date": "2011-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double free caused by malformed XPath expression in XSLT"
},
{
"cve": "CVE-2011-2834",
"discovery_date": "2011-09-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "735751"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: double-free caused by malformed XPath expression in XSLT",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2834"
},
{
"category": "external",
"summary": "RHBZ#735751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834"
}
],
"release_date": "2011-10-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2: double-free caused by malformed XPath expression in XSLT"
},
{
"cve": "CVE-2011-3102",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2012-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "822109"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: An off-by-one out-of-bounds write by XPointer part evaluation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3102"
},
{
"category": "external",
"summary": "RHBZ#822109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=822109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3102",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3102"
}
],
"release_date": "2012-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml: An off-by-one out-of-bounds write by XPointer part evaluation"
},
{
"cve": "CVE-2011-3905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2011-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "767387"
}
],
"notes": [
{
"category": "description",
"text": "libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2 out of bounds read",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of libxml2 as shipped with Red Hat Enterprise\nLinux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and\nRHSA-2012:0018 respectively. This issue affects the version of mingw32-libxml2\nas shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team\nhas rated this issue as having low security impact. A future update may address\nthis issue in Red Hat Enterprise Linux 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3905"
},
{
"category": "external",
"summary": "RHBZ#767387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767387"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3905"
}
],
"release_date": "2011-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libxml2 out of bounds read"
},
{
"cve": "CVE-2011-3919",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2012-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "771896"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3919"
},
{
"category": "external",
"summary": "RHBZ#771896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3919"
}
],
"release_date": "2012-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Heap-based buffer overflow when decoding an entity reference with a long name"
},
{
"cve": "CVE-2012-0841",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"discovery_date": "2012-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "787067"
}
],
"notes": [
{
"category": "description",
"text": "libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: hash table collisions CPU usage DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-0841"
},
{
"category": "external",
"summary": "RHBZ#787067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0841",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0841"
}
],
"release_date": "2012-02-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: hash table collisions CPU usage DoS"
},
{
"cve": "CVE-2012-5134",
"discovery_date": "2012-11-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "880466"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Heap-buffer-underflow in xmlParseAttValueComplex",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5134"
},
{
"category": "external",
"summary": "RHBZ#880466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880466"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5134",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5134"
}
],
"release_date": "2012-11-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-31T19:14:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0217"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Client-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Client-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6ComputeNode-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Server-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Server-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-0:2.7.6-6.el6_3.src",
"6Workstation-optional-6.3.z:mingw32-libxml2-debuginfo-0:2.7.6-6.el6_3.noarch",
"6Workstation-optional-6.3.z:mingw32-libxml2-static-0:2.7.6-6.el6_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml2: Heap-buffer-underflow in xmlParseAttValueComplex"
}
]
}
FKIE_CVE-2011-2834
Vulnerability from fkie_nvd - Published: 2011-09-19 12:02 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| chrome-cve-admin@google.com | http://code.google.com/p/chromium/issues/detail?id=93472 | ||
| chrome-cve-admin@google.com | http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html | ||
| chrome-cve-admin@google.com | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 | ||
| chrome-cve-admin@google.com | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | ||
| chrome-cve-admin@google.com | http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html | ||
| chrome-cve-admin@google.com | http://osvdb.org/75560 | ||
| chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2013-0217.html | ||
| chrome-cve-admin@google.com | http://support.apple.com/kb/HT5281 | ||
| chrome-cve-admin@google.com | http://support.apple.com/kb/HT5503 | ||
| chrome-cve-admin@google.com | http://www.debian.org/security/2012/dsa-2394 | ||
| chrome-cve-admin@google.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:145 | ||
| chrome-cve-admin@google.com | http://www.redhat.com/support/errata/RHSA-2011-1749.html | ||
| chrome-cve-admin@google.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/69885 | ||
| chrome-cve-admin@google.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://code.google.com/p/chromium/issues/detail?id=93472 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/75560 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0217.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5281 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5503 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2394 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:145 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1749.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/69885 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410 |
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| apple | iphone_os | * | |
| apple | mac_os_x | * | |
| debian | debian_linux | 5.0 | |
| debian | debian_linux | 6.0 | |
| debian | debian_linux | 7.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server_eus | 6.3 | |
| redhat | enterprise_linux_workstation | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56B5D5D9-5161-486F-90AE-482AAD0F279E",
"versionEndExcluding": "14.0.835.163",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72A06974-6834-406E-BB3E-F9935B18F877",
"versionEndExcluding": "6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F141010-3825-453D-BD01-93A929D3C02C",
"versionEndExcluding": "10.7.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "413CC30E-5FFE-47A4-B38B-80E3A9B13238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling."
},
{
"lang": "es",
"value": "Vulnerabilidad de doble liberaci\u00f3n en libxml2, tal y como se usa en Google Chrome antes de v14.0.835.163, permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores relacionados con el manejo de XPath."
}
],
"id": "CVE-2011-2834",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-09-19T12:02:55.620",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://osvdb.org/75560"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://support.apple.com/kb/HT5503"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.debian.org/security/2012/dsa-2394"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/75560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT5503"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2394"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-R39R-M3XH-JH67
Vulnerability from github – Published: 2022-05-13 01:26 – Updated: 2022-05-13 01:26Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
{
"affected": [],
"aliases": [
"CVE-2011-2834"
],
"database_specific": {
"cwe_ids": [
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-09-19T12:02:00Z",
"severity": "MODERATE"
},
"details": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"id": "GHSA-r39r-m3xh-jh67",
"modified": "2022-05-13T01:26:50Z",
"published": "2022-05-13T01:26:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2834"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"type": "WEB",
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"type": "WEB",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"type": "WEB",
"url": "http://osvdb.org/75560"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5281"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT5503"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2394"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-2834
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2834",
"description": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"id": "GSD-2011-2834",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2834.html",
"https://www.debian.org/security/2012/dsa-2394",
"https://access.redhat.com/errata/RHSA-2013:0217",
"https://access.redhat.com/errata/RHSA-2012:0017",
"https://access.redhat.com/errata/RHSA-2012:0016",
"https://access.redhat.com/errata/RHSA-2011:1749",
"https://linux.oracle.com/cve/CVE-2011-2834.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2834"
],
"details": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.",
"id": "GSD-2011-2834",
"modified": "2023-12-13T01:19:06.665933Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "MDVSA-2011:145",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"name": "HPSBMU02786",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "75560",
"refsource": "OSVDB",
"url": "http://osvdb.org/75560"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "RHSA-2013:0217",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "oval:org.mitre.oval:def:14410",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
},
{
"name": "RHSA-2011:1749",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=93472",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"name": "chrome-libxml-code-execution(69885)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"name": "SSRT100877",
"refsource": "HP",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "DSA-2394",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2394"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "14.0.835.163",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.7.4",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2834"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://code.google.com/p/chromium/issues/detail?id=93472",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=93472"
},
{
"name": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html"
},
{
"name": "75560",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/75560"
},
{
"name": "MDVSA-2011:145",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:145"
},
{
"name": "RHSA-2011:1749",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1749.html"
},
{
"name": "http://support.apple.com/kb/HT5281",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5281"
},
{
"name": "APPLE-SA-2012-05-09-1",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
},
{
"name": "SSRT100877",
"refsource": "HP",
"tags": [
"Broken Link"
],
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name": "http://support.apple.com/kb/HT5503",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT5503"
},
{
"name": "APPLE-SA-2012-09-19-1",
"refsource": "APPLE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
},
{
"name": "DSA-2394",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2012/dsa-2394"
},
{
"name": "RHSA-2013:0217",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html"
},
{
"name": "chrome-libxml-code-execution(69885)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69885"
},
{
"name": "oval:org.mitre.oval:def:14410",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2020-05-08T18:12Z",
"publishedDate": "2011-09-19T12:02Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.