Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-3387 (GCVE-0-2007-3387)
Vulnerability from cvelistv5 – Published: 2007-07-30 23:00 – Updated: 2024-08-07 14:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T14:14:13.257Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2007:0730",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"name": "USN-496-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"name": "DSA-1355",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"name": "ADV-2007-2705",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"name": "SUSE-SR:2007:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"name": "MDKSA-2007:164",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"name": "MDKSA-2007:165",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"name": "26307",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26307"
},
{
"name": "MDKSA-2007:158",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"name": "DSA-1350",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"name": "20070814 FLEA-2007-0045-1 poppler",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"name": "26468",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26468"
},
{
"name": "20070814 FLEA-2007-0044-1 tetex tetex-dvips tetex-fonts",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"name": "26982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26982"
},
{
"name": "26254",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26254"
},
{
"name": "26370",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26370"
},
{
"name": "DSA-1348",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"name": "26325",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26325"
},
{
"name": "26413",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26413"
},
{
"name": "DSA-1352",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"name": "GLSA-200710-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"name": "DSA-1354",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"name": "USN-496-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"name": "MDKSA-2007:163",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"name": "RHSA-2007:0731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"name": "40127",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/40127"
},
{
"name": "26862",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26862"
},
{
"name": "GLSA-200805-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name": "26281",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26281"
},
{
"name": "RHSA-2007:0720",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"name": "GLSA-200709-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"name": "25124",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/25124"
},
{
"name": "26514",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26514"
},
{
"name": "26467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26467"
},
{
"name": "SSA:2007-316-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"name": "26432",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26432"
},
{
"name": "26410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26410"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"name": "26607",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26607"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"name": "30168",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30168"
},
{
"name": "26358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26358"
},
{
"name": "26365",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26365"
},
{
"name": "26627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26627"
},
{
"name": "26293",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26293"
},
{
"name": "26283",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26283"
},
{
"name": "MDKSA-2007:159",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"name": "27308",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27308"
},
{
"name": "MDKSA-2007:160",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"name": "DSA-1357",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"name": "GLSA-200709-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"name": "26403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26403"
},
{
"name": "RHSA-2007:0732",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"name": "DSA-1349",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"name": "26251",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26251"
},
{
"name": "oval:org.mitre.oval:def:11149",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
},
{
"name": "26292",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26292"
},
{
"name": "MDKSA-2007:161",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"name": "26342",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26342"
},
{
"name": "26257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26257"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"name": "26395",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26395"
},
{
"name": "SSA:2007-222-05",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"name": "MDKSA-2007:162",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"name": "GLSA-200711-34",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "1018473",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1018473"
},
{
"name": "RHSA-2007:0729",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"name": "26188",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26188"
},
{
"name": "26278",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26278"
},
{
"name": "26425",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26425"
},
{
"name": "GLSA-200710-20",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"name": "ADV-2007-2704",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"name": "DSA-1347",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"name": "RHSA-2007:0735",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"name": "20070816 FLEA-2007-0046-1 cups",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"name": "27281",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27281"
},
{
"name": "20070801-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI",
"x_transferred"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"name": "26436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26436"
},
{
"name": "26343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26343"
},
{
"name": "26407",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26407"
},
{
"name": "26255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26255"
},
{
"name": "27156",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27156"
},
{
"name": "26318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26318"
},
{
"name": "26470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26470"
},
{
"name": "SUSE-SR:2007:015",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "26297",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26297"
},
{
"name": "26405",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26405"
},
{
"name": "27637",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27637"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-07-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2007:0730",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"name": "USN-496-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"name": "DSA-1355",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"name": "ADV-2007-2705",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"name": "SUSE-SR:2007:016",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"name": "MDKSA-2007:164",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"name": "MDKSA-2007:165",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"name": "26307",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26307"
},
{
"name": "MDKSA-2007:158",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"name": "DSA-1350",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"name": "20070814 FLEA-2007-0045-1 poppler",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"name": "26468",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26468"
},
{
"name": "20070814 FLEA-2007-0044-1 tetex tetex-dvips tetex-fonts",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"name": "26982",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26982"
},
{
"name": "26254",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26254"
},
{
"name": "26370",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26370"
},
{
"name": "DSA-1348",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"name": "26325",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26325"
},
{
"name": "26413",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26413"
},
{
"name": "DSA-1352",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"name": "GLSA-200710-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"name": "DSA-1354",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"name": "USN-496-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"name": "MDKSA-2007:163",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"name": "RHSA-2007:0731",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"name": "40127",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/40127"
},
{
"name": "26862",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26862"
},
{
"name": "GLSA-200805-13",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name": "26281",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26281"
},
{
"name": "RHSA-2007:0720",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"name": "GLSA-200709-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"name": "25124",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/25124"
},
{
"name": "26514",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26514"
},
{
"name": "26467",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26467"
},
{
"name": "SSA:2007-316-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"name": "26432",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26432"
},
{
"name": "26410",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26410"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"name": "26607",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26607"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"name": "30168",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30168"
},
{
"name": "26358",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26358"
},
{
"name": "26365",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26365"
},
{
"name": "26627",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26627"
},
{
"name": "26293",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26293"
},
{
"name": "26283",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26283"
},
{
"name": "MDKSA-2007:159",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"name": "27308",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27308"
},
{
"name": "MDKSA-2007:160",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"name": "DSA-1357",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"name": "GLSA-200709-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"name": "26403",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26403"
},
{
"name": "RHSA-2007:0732",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"name": "DSA-1349",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"name": "26251",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26251"
},
{
"name": "oval:org.mitre.oval:def:11149",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
},
{
"name": "26292",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26292"
},
{
"name": "MDKSA-2007:161",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"name": "26342",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26342"
},
{
"name": "26257",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26257"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"name": "26395",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26395"
},
{
"name": "SSA:2007-222-05",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"name": "MDKSA-2007:162",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"name": "GLSA-200711-34",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "1018473",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1018473"
},
{
"name": "RHSA-2007:0729",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"name": "26188",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26188"
},
{
"name": "26278",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26278"
},
{
"name": "26425",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26425"
},
{
"name": "GLSA-200710-20",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"name": "ADV-2007-2704",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"name": "DSA-1347",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"name": "RHSA-2007:0735",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"name": "20070816 FLEA-2007-0046-1 cups",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"name": "27281",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27281"
},
{
"name": "20070801-01-P",
"tags": [
"vendor-advisory",
"x_refsource_SGI"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"name": "26436",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26436"
},
{
"name": "26343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26343"
},
{
"name": "26407",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26407"
},
{
"name": "26255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26255"
},
{
"name": "27156",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27156"
},
{
"name": "26318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26318"
},
{
"name": "26470",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26470"
},
{
"name": "SUSE-SR:2007:015",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "26297",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26297"
},
{
"name": "26405",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26405"
},
{
"name": "27637",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27637"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-3387",
"datePublished": "2007-07-30T23:00:00",
"dateReserved": "2007-06-25T00:00:00",
"dateUpdated": "2024-08-07T14:14:13.257Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-3387\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-07-30T23:17:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en la funci\u00f3n StreamPredictor::StreamPredictor en xpdf versi\u00f3n 3.02, tal como es usado en (1) poppler anterior a versi\u00f3n 0.5.91, (2) gpdf anterior a versi\u00f3n 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, ( 6) PDFedit, y otros productos, podr\u00edan permitir que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de un archivo PDF creado que causa un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, en la funci\u00f3n StreamPredictor::getNextLine.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.11\",\"matchCriteriaId\":\"08916364-08F4-4416-B84E-2BDD2DC0A3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.5.91\",\"matchCriteriaId\":\"0B64EB12-180D-4943-93C5-D99E05DE8422\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gpdf_project:gpdf:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.8.2\",\"matchCriteriaId\":\"ED4AA11D-1589-49C3-AF7F-89C25F5E017B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14CC22C3-4195-4207-AAA4-E72F22334517\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E304C9-F780-4358-A58D-1E4C93977704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBDAFF8-DE44-4E80-B6BD-E341F767F501\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=187139\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/40127\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26188\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26251\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26254\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26255\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26257\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26278\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26281\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26283\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26292\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26293\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26297\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26307\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26318\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26325\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26342\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26343\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26358\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26370\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26395\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26403\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26405\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26407\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26410\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26425\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26432\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26436\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26467\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26468\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26470\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26514\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26607\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26627\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26862\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26982\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27156\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27281\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27308\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27637\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30168\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-12.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-17.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-20.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-34.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-13.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=535497\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1347\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1348\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1349\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1350\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1352\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1354\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1355\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1357\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kde.org/info/security/advisory-20070730-1.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:158\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:159\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:160\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:161\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:162\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:163\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:165\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_15_sr.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_16_sr.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0720.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0729.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0730.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0731.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0732.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0735.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476508/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476519/30/5400/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476765/30/5340/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25124\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018473\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-496-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-496-2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2704\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2705\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://issues.foresightlinux.org/browse/FL-471\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1596\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1604\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=187139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/40127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/26188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26251\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26278\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26293\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26307\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26370\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26405\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26410\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26436\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26514\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27156\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27308\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/27637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/30168\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-12.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200709-17.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200710-20.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-34.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-13.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=535497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2007/dsa-1357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kde.org/info/security/advisory-20070730-1.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:160\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:163\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_15_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_16_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0729.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0730.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0731.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0732.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0735.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476508/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476519/30/5400/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/476765/30/5340/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1018473\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-496-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-496-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/2705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://issues.foresightlinux.org/browse/FL-471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1596\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2007:0732
Vulnerability from csaf_redhat - Published: 2007-07-30 18:58 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated poppler packages that fix a security issue in PDF handling are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Poppler is a PDF rendering library, used by applications such as evince.\n\nMaurycy Prodeus discovered an integer overflow flaw in the processing\nof PDF files. An attacker could create a malicious PDF file that would\ncause an application linked with poppler to crash or potentially execute\narbitrary code when opened. (CVE-2007-3387)\n\nAll users of poppler should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0732",
"url": "https://access.redhat.com/errata/RHSA-2007:0732"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0732.json"
}
],
"title": "Red Hat Security Advisory: poppler security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:05+00:00",
"generator": {
"date": "2025-11-21T17:32:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0732",
"initial_release_date": "2007-07-30T18:58:00+00:00",
"revision_history": [
{
"date": "2007-07-30T18:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-07-30T14:58:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"product": {
"name": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"product_id": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.x86_64",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.x86_64",
"product_id": "poppler-0:0.5.4-4.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.i386",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.i386",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.i386",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.i386",
"product_id": "poppler-0:0.5.4-4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "poppler-utils-0:0.5.4-4.1.el5.i386",
"product": {
"name": "poppler-utils-0:0.5.4-4.1.el5.i386",
"product_id": "poppler-utils-0:0.5.4-4.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.src",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.src",
"product_id": "poppler-0:0.5.4-4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"product": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"product_id": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.ia64",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.ia64",
"product_id": "poppler-0:0.5.4-4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.ppc64",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.ppc64",
"product_id": "poppler-0:0.5.4-4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"product": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"product_id": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.ppc",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.ppc",
"product_id": "poppler-0:0.5.4-4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"product": {
"name": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"product_id": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.s390x",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.s390x",
"product_id": "poppler-0:0.5.4-4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"product": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"product_id": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "poppler-0:0.5.4-4.1.el5.s390",
"product": {
"name": "poppler-0:0.5.4-4.1.el5.s390",
"product_id": "poppler-0:0.5.4-4.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler@0.5.4-4.1.el5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "poppler-devel-0:0.5.4-4.1.el5.s390",
"product": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390",
"product_id": "poppler-devel-0:0.5.4-4.1.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.1.el5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.src"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.src"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-devel-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-utils-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-utils-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-utils-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-utils-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:poppler-utils-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.src"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.ppc64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.s390"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-devel-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-devel-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-devel-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-utils-0:0.5.4-4.1.el5.i386"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-utils-0:0.5.4-4.1.el5.ia64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-utils-0:0.5.4-4.1.el5.ppc"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-utils-0:0.5.4-4.1.el5.s390x"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "poppler-utils-0:0.5.4-4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:poppler-utils-0:0.5.4-4.1.el5.x86_64"
},
"product_reference": "poppler-utils-0:0.5.4-4.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.src",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-0:0.5.4-4.1.el5.i386",
"5Client:poppler-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-0:0.5.4-4.1.el5.s390",
"5Client:poppler-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-0:0.5.4-4.1.el5.src",
"5Client:poppler-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Client:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Client:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-utils-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-0:0.5.4-4.1.el5.i386",
"5Server:poppler-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-0:0.5.4-4.1.el5.s390",
"5Server:poppler-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-0:0.5.4-4.1.el5.src",
"5Server:poppler-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Server:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Server:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-utils-0:0.5.4-4.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-07-30T18:58:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.src",
"5Client-Workstation:poppler-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Client-Workstation:poppler-utils-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-0:0.5.4-4.1.el5.i386",
"5Client:poppler-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-0:0.5.4-4.1.el5.s390",
"5Client:poppler-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-0:0.5.4-4.1.el5.src",
"5Client:poppler-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Client:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Client:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Client:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Client:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Client:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Client:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Client:poppler-utils-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-0:0.5.4-4.1.el5.i386",
"5Server:poppler-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-0:0.5.4-4.1.el5.s390",
"5Server:poppler-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-0:0.5.4-4.1.el5.src",
"5Server:poppler-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.i386",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-debuginfo-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.i386",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-devel-0:0.5.4-4.1.el5.ppc64",
"5Server:poppler-devel-0:0.5.4-4.1.el5.s390",
"5Server:poppler-devel-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-devel-0:0.5.4-4.1.el5.x86_64",
"5Server:poppler-utils-0:0.5.4-4.1.el5.i386",
"5Server:poppler-utils-0:0.5.4-4.1.el5.ia64",
"5Server:poppler-utils-0:0.5.4-4.1.el5.ppc",
"5Server:poppler-utils-0:0.5.4-4.1.el5.s390x",
"5Server:poppler-utils-0:0.5.4-4.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0732"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
RHSA-2007:0720
Vulnerability from csaf_redhat - Published: 2007-07-30 18:36 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated CUPS packages that fix a security issue in PDF handling are now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX(R) operating systems.\n\nMaurycy Prodeus discovered an integer overflow flaw in the way CUPS processes\nPDF files. An attacker could create a malicious PDF file that could\npotentially execute arbitrary code when printed. (CVE-2007-3387)\n\nAll users of CUPS should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0720",
"url": "https://access.redhat.com/errata/RHSA-2007:0720"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0720.json"
}
],
"title": "Red Hat Security Advisory: cups security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:01+00:00",
"generator": {
"date": "2025-11-21T17:32:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0720",
"initial_release_date": "2007-07-30T18:36:00+00:00",
"revision_history": [
{
"date": "2007-07-30T18:36:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:55:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.x86_64",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.x86_64",
"product_id": "cups-1:1.2.4-11.5.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"product": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"product_id": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.5.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.x86_64",
"product": {
"name": "cups-1:1.1.17-13.3.45.x86_64",
"product_id": "cups-1:1.1.17-13.3.45.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.x86_64",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.x86_64",
"product_id": "cups-libs-1:1.1.17-13.3.45.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.x86_64",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.x86_64",
"product_id": "cups-devel-1:1.1.17-13.3.45.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.i386",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.i386",
"product_id": "cups-1:1.2.4-11.5.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"product": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"product_id": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.5.3.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.i386",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.i386",
"product_id": "cups-libs-1:1.1.17-13.3.45.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.i386",
"product": {
"name": "cups-1:1.1.17-13.3.45.i386",
"product_id": "cups-1:1.1.17-13.3.45.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.i386",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.i386",
"product_id": "cups-devel-1:1.1.17-13.3.45.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.src",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.src",
"product_id": "cups-1:1.2.4-11.5.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.src",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.src",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.src",
"product": {
"name": "cups-1:1.1.17-13.3.45.src",
"product_id": "cups-1:1.1.17-13.3.45.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.ia64",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.ia64",
"product_id": "cups-1:1.2.4-11.5.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"product": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"product_id": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.5.3.el5?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.ia64",
"product": {
"name": "cups-1:1.1.17-13.3.45.ia64",
"product_id": "cups-1:1.1.17-13.3.45.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.ia64",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.ia64",
"product_id": "cups-libs-1:1.1.17-13.3.45.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.ia64",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.ia64",
"product_id": "cups-devel-1:1.1.17-13.3.45.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=ia64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.ppc64",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc64",
"product_id": "cups-libs-1:1.1.17-13.3.45.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.ppc",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.ppc",
"product_id": "cups-1:1.2.4-11.5.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"product": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"product_id": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.5.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.ppc",
"product": {
"name": "cups-1:1.1.17-13.3.45.ppc",
"product_id": "cups-1:1.1.17-13.3.45.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.ppc",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc",
"product_id": "cups-libs-1:1.1.17-13.3.45.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.ppc",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.ppc",
"product_id": "cups-devel-1:1.1.17-13.3.45.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.2.4-11.5.3.el5.s390x",
"product": {
"name": "cups-1:1.2.4-11.5.3.el5.s390x",
"product_id": "cups-1:1.2.4-11.5.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.2.4-11.5.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"product": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"product_id": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.5.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.s390x",
"product": {
"name": "cups-1:1.1.17-13.3.45.s390x",
"product_id": "cups-1:1.1.17-13.3.45.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.s390x",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.s390x",
"product_id": "cups-libs-1:1.1.17-13.3.45.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.s390x",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.s390x",
"product_id": "cups-devel-1:1.1.17-13.3.45.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"product": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"product_id": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.5.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"product": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"product_id": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.5.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"product": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"product_id": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.5.3.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.20.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.20.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.20.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"product_id": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.20.2?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-libs-1:1.1.17-13.3.45.s390",
"product": {
"name": "cups-libs-1:1.1.17-13.3.45.s390",
"product_id": "cups-libs-1:1.1.17-13.3.45.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.45?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"product": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"product_id": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.45?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.17-13.3.45.s390",
"product": {
"name": "cups-1:1.1.17-13.3.45.s390",
"product_id": "cups-1:1.1.17-13.3.45.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.17-13.3.45?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.17-13.3.45.s390",
"product": {
"name": "cups-devel-1:1.1.17-13.3.45.s390",
"product_id": "cups-devel-1:1.1.17-13.3.45.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.45?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.src"
},
"product_reference": "cups-1:1.1.17-13.3.45.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-devel-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:cups-libs-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.src"
},
"product_reference": "cups-1:1.1.17-13.3.45.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-devel-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:cups-libs-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.src"
},
"product_reference": "cups-1:1.1.17-13.3.45.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-devel-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:cups-libs-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.src"
},
"product_reference": "cups-1:1.1.17-13.3.45.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-devel-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-devel-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.i386"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.ia64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.ppc"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.ppc64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.s390"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.s390x"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.17-13.3.45.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:cups-libs-1:1.1.17-13.3.45.x86_64"
},
"product_reference": "cups-libs-1:1.1.17-13.3.45.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.src"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.src"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-devel-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-libs-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-lpd-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-lpd-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-lpd-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-lpd-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:cups-lpd-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.src"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-devel-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.s390"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-libs-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-lpd-1:1.2.4-11.5.3.el5.i386"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-lpd-1:1.2.4-11.5.3.el5.ia64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-lpd-1:1.2.4-11.5.3.el5.ppc"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-lpd-1:1.2.4-11.5.3.el5.s390x"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:cups-lpd-1:1.2.4-11.5.3.el5.x86_64"
},
"product_reference": "cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:cups-1:1.1.17-13.3.45.i386",
"3AS:cups-1:1.1.17-13.3.45.ia64",
"3AS:cups-1:1.1.17-13.3.45.ppc",
"3AS:cups-1:1.1.17-13.3.45.s390",
"3AS:cups-1:1.1.17-13.3.45.s390x",
"3AS:cups-1:1.1.17-13.3.45.src",
"3AS:cups-1:1.1.17-13.3.45.x86_64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3AS:cups-devel-1:1.1.17-13.3.45.i386",
"3AS:cups-devel-1:1.1.17-13.3.45.ia64",
"3AS:cups-devel-1:1.1.17-13.3.45.ppc",
"3AS:cups-devel-1:1.1.17-13.3.45.s390",
"3AS:cups-devel-1:1.1.17-13.3.45.s390x",
"3AS:cups-devel-1:1.1.17-13.3.45.x86_64",
"3AS:cups-libs-1:1.1.17-13.3.45.i386",
"3AS:cups-libs-1:1.1.17-13.3.45.ia64",
"3AS:cups-libs-1:1.1.17-13.3.45.ppc",
"3AS:cups-libs-1:1.1.17-13.3.45.ppc64",
"3AS:cups-libs-1:1.1.17-13.3.45.s390",
"3AS:cups-libs-1:1.1.17-13.3.45.s390x",
"3AS:cups-libs-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-1:1.1.17-13.3.45.i386",
"3Desktop:cups-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-1:1.1.17-13.3.45.s390",
"3Desktop:cups-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-1:1.1.17-13.3.45.src",
"3Desktop:cups-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-devel-1:1.1.17-13.3.45.i386",
"3Desktop:cups-devel-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-devel-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-devel-1:1.1.17-13.3.45.s390",
"3Desktop:cups-devel-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-devel-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.i386",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ppc64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.s390",
"3Desktop:cups-libs-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-libs-1:1.1.17-13.3.45.x86_64",
"3ES:cups-1:1.1.17-13.3.45.i386",
"3ES:cups-1:1.1.17-13.3.45.ia64",
"3ES:cups-1:1.1.17-13.3.45.ppc",
"3ES:cups-1:1.1.17-13.3.45.s390",
"3ES:cups-1:1.1.17-13.3.45.s390x",
"3ES:cups-1:1.1.17-13.3.45.src",
"3ES:cups-1:1.1.17-13.3.45.x86_64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3ES:cups-devel-1:1.1.17-13.3.45.i386",
"3ES:cups-devel-1:1.1.17-13.3.45.ia64",
"3ES:cups-devel-1:1.1.17-13.3.45.ppc",
"3ES:cups-devel-1:1.1.17-13.3.45.s390",
"3ES:cups-devel-1:1.1.17-13.3.45.s390x",
"3ES:cups-devel-1:1.1.17-13.3.45.x86_64",
"3ES:cups-libs-1:1.1.17-13.3.45.i386",
"3ES:cups-libs-1:1.1.17-13.3.45.ia64",
"3ES:cups-libs-1:1.1.17-13.3.45.ppc",
"3ES:cups-libs-1:1.1.17-13.3.45.ppc64",
"3ES:cups-libs-1:1.1.17-13.3.45.s390",
"3ES:cups-libs-1:1.1.17-13.3.45.s390x",
"3ES:cups-libs-1:1.1.17-13.3.45.x86_64",
"3WS:cups-1:1.1.17-13.3.45.i386",
"3WS:cups-1:1.1.17-13.3.45.ia64",
"3WS:cups-1:1.1.17-13.3.45.ppc",
"3WS:cups-1:1.1.17-13.3.45.s390",
"3WS:cups-1:1.1.17-13.3.45.s390x",
"3WS:cups-1:1.1.17-13.3.45.src",
"3WS:cups-1:1.1.17-13.3.45.x86_64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3WS:cups-devel-1:1.1.17-13.3.45.i386",
"3WS:cups-devel-1:1.1.17-13.3.45.ia64",
"3WS:cups-devel-1:1.1.17-13.3.45.ppc",
"3WS:cups-devel-1:1.1.17-13.3.45.s390",
"3WS:cups-devel-1:1.1.17-13.3.45.s390x",
"3WS:cups-devel-1:1.1.17-13.3.45.x86_64",
"3WS:cups-libs-1:1.1.17-13.3.45.i386",
"3WS:cups-libs-1:1.1.17-13.3.45.ia64",
"3WS:cups-libs-1:1.1.17-13.3.45.ppc",
"3WS:cups-libs-1:1.1.17-13.3.45.ppc64",
"3WS:cups-libs-1:1.1.17-13.3.45.s390",
"3WS:cups-libs-1:1.1.17-13.3.45.s390x",
"3WS:cups-libs-1:1.1.17-13.3.45.x86_64",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.src",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.src",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.src",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.src",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.src",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-1:1.2.4-11.5.3.el5.src",
"5Client:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-1:1.2.4-11.5.3.el5.src",
"5Server:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-07-30T18:36:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:cups-1:1.1.17-13.3.45.i386",
"3AS:cups-1:1.1.17-13.3.45.ia64",
"3AS:cups-1:1.1.17-13.3.45.ppc",
"3AS:cups-1:1.1.17-13.3.45.s390",
"3AS:cups-1:1.1.17-13.3.45.s390x",
"3AS:cups-1:1.1.17-13.3.45.src",
"3AS:cups-1:1.1.17-13.3.45.x86_64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3AS:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3AS:cups-devel-1:1.1.17-13.3.45.i386",
"3AS:cups-devel-1:1.1.17-13.3.45.ia64",
"3AS:cups-devel-1:1.1.17-13.3.45.ppc",
"3AS:cups-devel-1:1.1.17-13.3.45.s390",
"3AS:cups-devel-1:1.1.17-13.3.45.s390x",
"3AS:cups-devel-1:1.1.17-13.3.45.x86_64",
"3AS:cups-libs-1:1.1.17-13.3.45.i386",
"3AS:cups-libs-1:1.1.17-13.3.45.ia64",
"3AS:cups-libs-1:1.1.17-13.3.45.ppc",
"3AS:cups-libs-1:1.1.17-13.3.45.ppc64",
"3AS:cups-libs-1:1.1.17-13.3.45.s390",
"3AS:cups-libs-1:1.1.17-13.3.45.s390x",
"3AS:cups-libs-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-1:1.1.17-13.3.45.i386",
"3Desktop:cups-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-1:1.1.17-13.3.45.s390",
"3Desktop:cups-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-1:1.1.17-13.3.45.src",
"3Desktop:cups-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-devel-1:1.1.17-13.3.45.i386",
"3Desktop:cups-devel-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-devel-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-devel-1:1.1.17-13.3.45.s390",
"3Desktop:cups-devel-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-devel-1:1.1.17-13.3.45.x86_64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.i386",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ia64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ppc",
"3Desktop:cups-libs-1:1.1.17-13.3.45.ppc64",
"3Desktop:cups-libs-1:1.1.17-13.3.45.s390",
"3Desktop:cups-libs-1:1.1.17-13.3.45.s390x",
"3Desktop:cups-libs-1:1.1.17-13.3.45.x86_64",
"3ES:cups-1:1.1.17-13.3.45.i386",
"3ES:cups-1:1.1.17-13.3.45.ia64",
"3ES:cups-1:1.1.17-13.3.45.ppc",
"3ES:cups-1:1.1.17-13.3.45.s390",
"3ES:cups-1:1.1.17-13.3.45.s390x",
"3ES:cups-1:1.1.17-13.3.45.src",
"3ES:cups-1:1.1.17-13.3.45.x86_64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3ES:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3ES:cups-devel-1:1.1.17-13.3.45.i386",
"3ES:cups-devel-1:1.1.17-13.3.45.ia64",
"3ES:cups-devel-1:1.1.17-13.3.45.ppc",
"3ES:cups-devel-1:1.1.17-13.3.45.s390",
"3ES:cups-devel-1:1.1.17-13.3.45.s390x",
"3ES:cups-devel-1:1.1.17-13.3.45.x86_64",
"3ES:cups-libs-1:1.1.17-13.3.45.i386",
"3ES:cups-libs-1:1.1.17-13.3.45.ia64",
"3ES:cups-libs-1:1.1.17-13.3.45.ppc",
"3ES:cups-libs-1:1.1.17-13.3.45.ppc64",
"3ES:cups-libs-1:1.1.17-13.3.45.s390",
"3ES:cups-libs-1:1.1.17-13.3.45.s390x",
"3ES:cups-libs-1:1.1.17-13.3.45.x86_64",
"3WS:cups-1:1.1.17-13.3.45.i386",
"3WS:cups-1:1.1.17-13.3.45.ia64",
"3WS:cups-1:1.1.17-13.3.45.ppc",
"3WS:cups-1:1.1.17-13.3.45.s390",
"3WS:cups-1:1.1.17-13.3.45.s390x",
"3WS:cups-1:1.1.17-13.3.45.src",
"3WS:cups-1:1.1.17-13.3.45.x86_64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.i386",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ia64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.ppc64",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.s390",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.s390x",
"3WS:cups-debuginfo-1:1.1.17-13.3.45.x86_64",
"3WS:cups-devel-1:1.1.17-13.3.45.i386",
"3WS:cups-devel-1:1.1.17-13.3.45.ia64",
"3WS:cups-devel-1:1.1.17-13.3.45.ppc",
"3WS:cups-devel-1:1.1.17-13.3.45.s390",
"3WS:cups-devel-1:1.1.17-13.3.45.s390x",
"3WS:cups-devel-1:1.1.17-13.3.45.x86_64",
"3WS:cups-libs-1:1.1.17-13.3.45.i386",
"3WS:cups-libs-1:1.1.17-13.3.45.ia64",
"3WS:cups-libs-1:1.1.17-13.3.45.ppc",
"3WS:cups-libs-1:1.1.17-13.3.45.ppc64",
"3WS:cups-libs-1:1.1.17-13.3.45.s390",
"3WS:cups-libs-1:1.1.17-13.3.45.s390x",
"3WS:cups-libs-1:1.1.17-13.3.45.x86_64",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.src",
"4AS:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4AS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.src",
"4Desktop:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.src",
"4ES:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4ES:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.src",
"4WS:cups-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.ppc64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-devel-1:1.1.22-0.rc1.9.20.2.x86_64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.i386",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ia64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.ppc64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.s390x",
"4WS:cups-libs-1:1.1.22-0.rc1.9.20.2.x86_64",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.src",
"5Client-Workstation:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Client-Workstation:cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-1:1.2.4-11.5.3.el5.src",
"5Client:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Client:cups-lpd-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-1:1.2.4-11.5.3.el5.src",
"5Server:cups-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-debuginfo-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-devel-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.ppc64",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.s390",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-libs-1:1.2.4-11.5.3.el5.x86_64",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.i386",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.ia64",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.ppc",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.s390x",
"5Server:cups-lpd-1:1.2.4-11.5.3.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0720"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
RHSA-2007:0731
Vulnerability from csaf_redhat - Published: 2007-08-01 09:46 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated tetex packages that fix a security issue in PDF handling are now\navailable for Red Hat Enterprise Linux 2.1, 3, 4, and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "TeTeX is an implementation of TeX. TeX takes a text file and a set of\nformatting commands as input and creates a typesetter-independent .dvi\n(DeVice Independent) file as output.\n\nMaurycy Prodeus discovered an integer overflow flaw in the processing\nof PDF files. An attacker could create a malicious PDF file that would\ncause TeTeX to crash or potentially execute arbitrary code when opened. \n(CVE-2007-3387)\n\nAll users of TeTeX should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0731",
"url": "https://access.redhat.com/errata/RHSA-2007:0731"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0731.json"
}
],
"title": "Red Hat Security Advisory: tetex security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:05+00:00",
"generator": {
"date": "2025-11-21T17:32:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0731",
"initial_release_date": "2007-08-01T09:46:00+00:00",
"revision_history": [
{
"date": "2007-08-01T09:46:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-08-01T05:46:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-xdvi-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-xdvi-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-xdvi-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-doc-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-doc-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-fonts-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-fonts-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-afm-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-afm-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-latex-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-latex-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:3.0-33.1.el5.x86_64",
"product": {
"name": "tetex-dvips-0:3.0-33.1.el5.x86_64",
"product_id": "tetex-dvips-0:3.0-33.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.x86_64",
"product_id": "tetex-latex-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.x86_64",
"product_id": "tetex-afm-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-0:1.0.7-67.10.x86_64",
"product_id": "tetex-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.x86_64",
"product_id": "tetex-fonts-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.x86_64",
"product_id": "tetex-dvips-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"product_id": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-xdvi-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-xdvi-0:3.0-33.1.el5.i386",
"product_id": "tetex-xdvi-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-doc-0:3.0-33.1.el5.i386",
"product_id": "tetex-doc-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-0:3.0-33.1.el5.i386",
"product_id": "tetex-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.i386",
"product_id": "tetex-debuginfo-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-fonts-0:3.0-33.1.el5.i386",
"product_id": "tetex-fonts-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-afm-0:3.0-33.1.el5.i386",
"product_id": "tetex-afm-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-latex-0:3.0-33.1.el5.i386",
"product_id": "tetex-latex-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:3.0-33.1.el5.i386",
"product": {
"name": "tetex-dvips-0:3.0-33.1.el5.i386",
"product_id": "tetex-dvips-0:3.0-33.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.i386",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.i386",
"product_id": "tetex-latex-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.i386",
"product_id": "tetex-afm-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-0:1.0.7-67.10.i386",
"product_id": "tetex-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.i386",
"product_id": "tetex-fonts-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.i386",
"product_id": "tetex-dvips-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.i386",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.i386",
"product_id": "tetex-xdvi-0:1.0.7-67.10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-afm-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-afm-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-latex-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-latex-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-doc-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-doc-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"product": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"product_id": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvilj@1.0.7-38.5E.11?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.src",
"product": {
"name": "tetex-0:3.0-33.1.el5.src",
"product_id": "tetex-0:3.0-33.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.src",
"product": {
"name": "tetex-0:1.0.7-67.10.src",
"product_id": "tetex-0:1.0.7-67.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=src"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-38.5E.11.src",
"product": {
"name": "tetex-0:1.0.7-38.5E.11.src",
"product_id": "tetex-0:1.0.7-38.5E.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-38.5E.11?arch=src"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-xdvi-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ia64",
"product_id": "tetex-xdvi-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-doc-0:3.0-33.1.el5.ia64",
"product_id": "tetex-doc-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-0:3.0-33.1.el5.ia64",
"product_id": "tetex-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ia64",
"product_id": "tetex-debuginfo-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-fonts-0:3.0-33.1.el5.ia64",
"product_id": "tetex-fonts-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-afm-0:3.0-33.1.el5.ia64",
"product_id": "tetex-afm-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-latex-0:3.0-33.1.el5.ia64",
"product_id": "tetex-latex-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:3.0-33.1.el5.ia64",
"product": {
"name": "tetex-dvips-0:3.0-33.1.el5.ia64",
"product_id": "tetex-dvips-0:3.0-33.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.ia64",
"product_id": "tetex-latex-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.ia64",
"product_id": "tetex-afm-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-0:1.0.7-67.10.ia64",
"product_id": "tetex-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.ia64",
"product_id": "tetex-fonts-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.ia64",
"product_id": "tetex-dvips-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.ia64",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.ia64",
"product_id": "tetex-xdvi-0:1.0.7-67.10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"product": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"product_id": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvilj@1.0.7-38.5E.11?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-xdvi-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ppc",
"product_id": "tetex-xdvi-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-doc-0:3.0-33.1.el5.ppc",
"product_id": "tetex-doc-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-0:3.0-33.1.el5.ppc",
"product_id": "tetex-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ppc",
"product_id": "tetex-debuginfo-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-fonts-0:3.0-33.1.el5.ppc",
"product_id": "tetex-fonts-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-afm-0:3.0-33.1.el5.ppc",
"product_id": "tetex-afm-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-latex-0:3.0-33.1.el5.ppc",
"product_id": "tetex-latex-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:3.0-33.1.el5.ppc",
"product": {
"name": "tetex-dvips-0:3.0-33.1.el5.ppc",
"product_id": "tetex-dvips-0:3.0-33.1.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.1.el5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.ppc",
"product_id": "tetex-latex-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.ppc",
"product_id": "tetex-afm-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-0:1.0.7-67.10.ppc",
"product_id": "tetex-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.ppc",
"product_id": "tetex-fonts-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.ppc",
"product_id": "tetex-dvips-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.ppc",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.ppc",
"product_id": "tetex-xdvi-0:1.0.7-67.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-xdvi-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-xdvi-0:3.0-33.1.el5.s390x",
"product_id": "tetex-xdvi-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-doc-0:3.0-33.1.el5.s390x",
"product_id": "tetex-doc-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-0:3.0-33.1.el5.s390x",
"product_id": "tetex-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.s390x",
"product_id": "tetex-debuginfo-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-fonts-0:3.0-33.1.el5.s390x",
"product_id": "tetex-fonts-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-afm-0:3.0-33.1.el5.s390x",
"product_id": "tetex-afm-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-latex-0:3.0-33.1.el5.s390x",
"product_id": "tetex-latex-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:3.0-33.1.el5.s390x",
"product": {
"name": "tetex-dvips-0:3.0-33.1.el5.s390x",
"product_id": "tetex-dvips-0:3.0-33.1.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.1.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.s390x",
"product_id": "tetex-latex-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.s390x",
"product_id": "tetex-afm-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-0:1.0.7-67.10.s390x",
"product_id": "tetex-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.s390x",
"product_id": "tetex-fonts-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.s390x",
"product_id": "tetex-dvips-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.s390x",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390x",
"product_id": "tetex-xdvi-0:1.0.7-67.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "tetex-debuginfo-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390",
"product_id": "tetex-debuginfo-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-latex-0:1.0.7-67.10.s390",
"product_id": "tetex-latex-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-afm-0:1.0.7-67.10.s390",
"product_id": "tetex-afm-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-0:1.0.7-67.10.s390",
"product_id": "tetex-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-fonts-0:1.0.7-67.10.s390",
"product_id": "tetex-fonts-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-dvips-0:1.0.7-67.10.s390",
"product_id": "tetex-dvips-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:1.0.7-67.10.s390",
"product": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390",
"product_id": "tetex-xdvi-0:1.0.7-67.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@1.0.7-67.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-dvips@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-latex@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-fonts@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-doc@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-xdvi@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-afm@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"product": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"product_id": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tetex-debuginfo@2.0.2-22.0.1.EL4.8?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-0:1.0.7-38.5E.11.src"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-afm-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-afm-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-doc-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-doc-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-dvips-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-dvips-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-fonts-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-fonts-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-latex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-latex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-0:1.0.7-38.5E.11.src"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-afm-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-afm-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-doc-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-doc-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-dvips-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-dvips-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-fonts-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-fonts-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-latex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-latex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-0:1.0.7-38.5E.11.src"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-afm-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-afm-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-doc-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-doc-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-dvips-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-dvips-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-fonts-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-fonts-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-latex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-latex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-38.5E.11.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-0:1.0.7-38.5E.11.src"
},
"product_reference": "tetex-0:1.0.7-38.5E.11.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-afm-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-afm-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-doc-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-doc-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-doc-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvilj-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-dvips-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-dvips-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-fonts-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-fonts-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-latex-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-latex-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-38.5E.11.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.src"
},
"product_reference": "tetex-0:1.0.7-67.10.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-afm-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-debuginfo-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-dvips-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-fonts-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-latex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:tetex-xdvi-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.src"
},
"product_reference": "tetex-0:1.0.7-67.10.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-afm-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-debuginfo-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-dvips-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-fonts-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-latex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:tetex-xdvi-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.src"
},
"product_reference": "tetex-0:1.0.7-67.10.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-afm-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-debuginfo-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-dvips-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-fonts-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-latex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:tetex-xdvi-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.src"
},
"product_reference": "tetex-0:1.0.7-67.10.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-afm-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-afm-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-debuginfo-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-debuginfo-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-dvips-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-dvips-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-fonts-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-fonts-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-latex-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-latex-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.i386"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.ia64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.ppc"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.s390"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.s390x"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:1.0.7-67.10.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:tetex-xdvi-0:1.0.7-67.10.x86_64"
},
"product_reference": "tetex-xdvi-0:1.0.7-67.10.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.src"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.src"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.src"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.src"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64"
},
"product_reference": "tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.src"
},
"product_reference": "tetex-0:3.0-33.1.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-afm-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-afm-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-afm-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-afm-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-afm-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-debuginfo-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-debuginfo-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-debuginfo-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-debuginfo-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-debuginfo-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-doc-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-doc-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-doc-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-doc-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-doc-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-dvips-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-dvips-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-dvips-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-dvips-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-dvips-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-fonts-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-fonts-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-fonts-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-fonts-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-fonts-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-latex-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-latex-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-latex-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-latex-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-latex-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-xdvi-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-xdvi-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-xdvi-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-xdvi-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:tetex-xdvi-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.src"
},
"product_reference": "tetex-0:3.0-33.1.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-afm-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-afm-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-afm-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-afm-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-afm-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-afm-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-afm-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-debuginfo-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-debuginfo-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-debuginfo-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-debuginfo-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-debuginfo-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-debuginfo-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-doc-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-doc-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-doc-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-doc-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-doc-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-doc-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-doc-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-dvips-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-dvips-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-dvips-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-dvips-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-dvips-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-dvips-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-dvips-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-fonts-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-fonts-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-fonts-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-fonts-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-fonts-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-fonts-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-fonts-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-latex-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-latex-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-latex-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-latex-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-latex-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-latex-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-latex-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-xdvi-0:3.0-33.1.el5.i386"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-xdvi-0:3.0-33.1.el5.ia64"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-xdvi-0:3.0-33.1.el5.ppc"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-xdvi-0:3.0-33.1.el5.s390x"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tetex-xdvi-0:3.0-33.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:tetex-xdvi-0:3.0-33.1.el5.x86_64"
},
"product_reference": "tetex-xdvi-0:3.0-33.1.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:tetex-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-0:1.0.7-38.5E.11.src",
"2.1AS:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-0:1.0.7-38.5E.11.src",
"2.1AW:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-0:1.0.7-38.5E.11.src",
"2.1ES:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-0:1.0.7-38.5E.11.src",
"2.1WS:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"3AS:tetex-0:1.0.7-67.10.i386",
"3AS:tetex-0:1.0.7-67.10.ia64",
"3AS:tetex-0:1.0.7-67.10.ppc",
"3AS:tetex-0:1.0.7-67.10.s390",
"3AS:tetex-0:1.0.7-67.10.s390x",
"3AS:tetex-0:1.0.7-67.10.src",
"3AS:tetex-0:1.0.7-67.10.x86_64",
"3AS:tetex-afm-0:1.0.7-67.10.i386",
"3AS:tetex-afm-0:1.0.7-67.10.ia64",
"3AS:tetex-afm-0:1.0.7-67.10.ppc",
"3AS:tetex-afm-0:1.0.7-67.10.s390",
"3AS:tetex-afm-0:1.0.7-67.10.s390x",
"3AS:tetex-afm-0:1.0.7-67.10.x86_64",
"3AS:tetex-debuginfo-0:1.0.7-67.10.i386",
"3AS:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3AS:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3AS:tetex-debuginfo-0:1.0.7-67.10.s390",
"3AS:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3AS:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3AS:tetex-dvips-0:1.0.7-67.10.i386",
"3AS:tetex-dvips-0:1.0.7-67.10.ia64",
"3AS:tetex-dvips-0:1.0.7-67.10.ppc",
"3AS:tetex-dvips-0:1.0.7-67.10.s390",
"3AS:tetex-dvips-0:1.0.7-67.10.s390x",
"3AS:tetex-dvips-0:1.0.7-67.10.x86_64",
"3AS:tetex-fonts-0:1.0.7-67.10.i386",
"3AS:tetex-fonts-0:1.0.7-67.10.ia64",
"3AS:tetex-fonts-0:1.0.7-67.10.ppc",
"3AS:tetex-fonts-0:1.0.7-67.10.s390",
"3AS:tetex-fonts-0:1.0.7-67.10.s390x",
"3AS:tetex-fonts-0:1.0.7-67.10.x86_64",
"3AS:tetex-latex-0:1.0.7-67.10.i386",
"3AS:tetex-latex-0:1.0.7-67.10.ia64",
"3AS:tetex-latex-0:1.0.7-67.10.ppc",
"3AS:tetex-latex-0:1.0.7-67.10.s390",
"3AS:tetex-latex-0:1.0.7-67.10.s390x",
"3AS:tetex-latex-0:1.0.7-67.10.x86_64",
"3AS:tetex-xdvi-0:1.0.7-67.10.i386",
"3AS:tetex-xdvi-0:1.0.7-67.10.ia64",
"3AS:tetex-xdvi-0:1.0.7-67.10.ppc",
"3AS:tetex-xdvi-0:1.0.7-67.10.s390",
"3AS:tetex-xdvi-0:1.0.7-67.10.s390x",
"3AS:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-0:1.0.7-67.10.i386",
"3Desktop:tetex-0:1.0.7-67.10.ia64",
"3Desktop:tetex-0:1.0.7-67.10.ppc",
"3Desktop:tetex-0:1.0.7-67.10.s390",
"3Desktop:tetex-0:1.0.7-67.10.s390x",
"3Desktop:tetex-0:1.0.7-67.10.src",
"3Desktop:tetex-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-afm-0:1.0.7-67.10.i386",
"3Desktop:tetex-afm-0:1.0.7-67.10.ia64",
"3Desktop:tetex-afm-0:1.0.7-67.10.ppc",
"3Desktop:tetex-afm-0:1.0.7-67.10.s390",
"3Desktop:tetex-afm-0:1.0.7-67.10.s390x",
"3Desktop:tetex-afm-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.i386",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-dvips-0:1.0.7-67.10.i386",
"3Desktop:tetex-dvips-0:1.0.7-67.10.ia64",
"3Desktop:tetex-dvips-0:1.0.7-67.10.ppc",
"3Desktop:tetex-dvips-0:1.0.7-67.10.s390",
"3Desktop:tetex-dvips-0:1.0.7-67.10.s390x",
"3Desktop:tetex-dvips-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-fonts-0:1.0.7-67.10.i386",
"3Desktop:tetex-fonts-0:1.0.7-67.10.ia64",
"3Desktop:tetex-fonts-0:1.0.7-67.10.ppc",
"3Desktop:tetex-fonts-0:1.0.7-67.10.s390",
"3Desktop:tetex-fonts-0:1.0.7-67.10.s390x",
"3Desktop:tetex-fonts-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-latex-0:1.0.7-67.10.i386",
"3Desktop:tetex-latex-0:1.0.7-67.10.ia64",
"3Desktop:tetex-latex-0:1.0.7-67.10.ppc",
"3Desktop:tetex-latex-0:1.0.7-67.10.s390",
"3Desktop:tetex-latex-0:1.0.7-67.10.s390x",
"3Desktop:tetex-latex-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.i386",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.ia64",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.ppc",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.s390",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.s390x",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3ES:tetex-0:1.0.7-67.10.i386",
"3ES:tetex-0:1.0.7-67.10.ia64",
"3ES:tetex-0:1.0.7-67.10.ppc",
"3ES:tetex-0:1.0.7-67.10.s390",
"3ES:tetex-0:1.0.7-67.10.s390x",
"3ES:tetex-0:1.0.7-67.10.src",
"3ES:tetex-0:1.0.7-67.10.x86_64",
"3ES:tetex-afm-0:1.0.7-67.10.i386",
"3ES:tetex-afm-0:1.0.7-67.10.ia64",
"3ES:tetex-afm-0:1.0.7-67.10.ppc",
"3ES:tetex-afm-0:1.0.7-67.10.s390",
"3ES:tetex-afm-0:1.0.7-67.10.s390x",
"3ES:tetex-afm-0:1.0.7-67.10.x86_64",
"3ES:tetex-debuginfo-0:1.0.7-67.10.i386",
"3ES:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3ES:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3ES:tetex-debuginfo-0:1.0.7-67.10.s390",
"3ES:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3ES:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3ES:tetex-dvips-0:1.0.7-67.10.i386",
"3ES:tetex-dvips-0:1.0.7-67.10.ia64",
"3ES:tetex-dvips-0:1.0.7-67.10.ppc",
"3ES:tetex-dvips-0:1.0.7-67.10.s390",
"3ES:tetex-dvips-0:1.0.7-67.10.s390x",
"3ES:tetex-dvips-0:1.0.7-67.10.x86_64",
"3ES:tetex-fonts-0:1.0.7-67.10.i386",
"3ES:tetex-fonts-0:1.0.7-67.10.ia64",
"3ES:tetex-fonts-0:1.0.7-67.10.ppc",
"3ES:tetex-fonts-0:1.0.7-67.10.s390",
"3ES:tetex-fonts-0:1.0.7-67.10.s390x",
"3ES:tetex-fonts-0:1.0.7-67.10.x86_64",
"3ES:tetex-latex-0:1.0.7-67.10.i386",
"3ES:tetex-latex-0:1.0.7-67.10.ia64",
"3ES:tetex-latex-0:1.0.7-67.10.ppc",
"3ES:tetex-latex-0:1.0.7-67.10.s390",
"3ES:tetex-latex-0:1.0.7-67.10.s390x",
"3ES:tetex-latex-0:1.0.7-67.10.x86_64",
"3ES:tetex-xdvi-0:1.0.7-67.10.i386",
"3ES:tetex-xdvi-0:1.0.7-67.10.ia64",
"3ES:tetex-xdvi-0:1.0.7-67.10.ppc",
"3ES:tetex-xdvi-0:1.0.7-67.10.s390",
"3ES:tetex-xdvi-0:1.0.7-67.10.s390x",
"3ES:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3WS:tetex-0:1.0.7-67.10.i386",
"3WS:tetex-0:1.0.7-67.10.ia64",
"3WS:tetex-0:1.0.7-67.10.ppc",
"3WS:tetex-0:1.0.7-67.10.s390",
"3WS:tetex-0:1.0.7-67.10.s390x",
"3WS:tetex-0:1.0.7-67.10.src",
"3WS:tetex-0:1.0.7-67.10.x86_64",
"3WS:tetex-afm-0:1.0.7-67.10.i386",
"3WS:tetex-afm-0:1.0.7-67.10.ia64",
"3WS:tetex-afm-0:1.0.7-67.10.ppc",
"3WS:tetex-afm-0:1.0.7-67.10.s390",
"3WS:tetex-afm-0:1.0.7-67.10.s390x",
"3WS:tetex-afm-0:1.0.7-67.10.x86_64",
"3WS:tetex-debuginfo-0:1.0.7-67.10.i386",
"3WS:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3WS:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3WS:tetex-debuginfo-0:1.0.7-67.10.s390",
"3WS:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3WS:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3WS:tetex-dvips-0:1.0.7-67.10.i386",
"3WS:tetex-dvips-0:1.0.7-67.10.ia64",
"3WS:tetex-dvips-0:1.0.7-67.10.ppc",
"3WS:tetex-dvips-0:1.0.7-67.10.s390",
"3WS:tetex-dvips-0:1.0.7-67.10.s390x",
"3WS:tetex-dvips-0:1.0.7-67.10.x86_64",
"3WS:tetex-fonts-0:1.0.7-67.10.i386",
"3WS:tetex-fonts-0:1.0.7-67.10.ia64",
"3WS:tetex-fonts-0:1.0.7-67.10.ppc",
"3WS:tetex-fonts-0:1.0.7-67.10.s390",
"3WS:tetex-fonts-0:1.0.7-67.10.s390x",
"3WS:tetex-fonts-0:1.0.7-67.10.x86_64",
"3WS:tetex-latex-0:1.0.7-67.10.i386",
"3WS:tetex-latex-0:1.0.7-67.10.ia64",
"3WS:tetex-latex-0:1.0.7-67.10.ppc",
"3WS:tetex-latex-0:1.0.7-67.10.s390",
"3WS:tetex-latex-0:1.0.7-67.10.s390x",
"3WS:tetex-latex-0:1.0.7-67.10.x86_64",
"3WS:tetex-xdvi-0:1.0.7-67.10.i386",
"3WS:tetex-xdvi-0:1.0.7-67.10.ia64",
"3WS:tetex-xdvi-0:1.0.7-67.10.ppc",
"3WS:tetex-xdvi-0:1.0.7-67.10.s390",
"3WS:tetex-xdvi-0:1.0.7-67.10.s390x",
"3WS:tetex-xdvi-0:1.0.7-67.10.x86_64",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"5Client:tetex-0:3.0-33.1.el5.i386",
"5Client:tetex-0:3.0-33.1.el5.ia64",
"5Client:tetex-0:3.0-33.1.el5.ppc",
"5Client:tetex-0:3.0-33.1.el5.s390x",
"5Client:tetex-0:3.0-33.1.el5.src",
"5Client:tetex-0:3.0-33.1.el5.x86_64",
"5Client:tetex-afm-0:3.0-33.1.el5.i386",
"5Client:tetex-afm-0:3.0-33.1.el5.ia64",
"5Client:tetex-afm-0:3.0-33.1.el5.ppc",
"5Client:tetex-afm-0:3.0-33.1.el5.s390x",
"5Client:tetex-afm-0:3.0-33.1.el5.x86_64",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.i386",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.ia64",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.ppc",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.s390x",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"5Client:tetex-doc-0:3.0-33.1.el5.i386",
"5Client:tetex-doc-0:3.0-33.1.el5.ia64",
"5Client:tetex-doc-0:3.0-33.1.el5.ppc",
"5Client:tetex-doc-0:3.0-33.1.el5.s390x",
"5Client:tetex-doc-0:3.0-33.1.el5.x86_64",
"5Client:tetex-dvips-0:3.0-33.1.el5.i386",
"5Client:tetex-dvips-0:3.0-33.1.el5.ia64",
"5Client:tetex-dvips-0:3.0-33.1.el5.ppc",
"5Client:tetex-dvips-0:3.0-33.1.el5.s390x",
"5Client:tetex-dvips-0:3.0-33.1.el5.x86_64",
"5Client:tetex-fonts-0:3.0-33.1.el5.i386",
"5Client:tetex-fonts-0:3.0-33.1.el5.ia64",
"5Client:tetex-fonts-0:3.0-33.1.el5.ppc",
"5Client:tetex-fonts-0:3.0-33.1.el5.s390x",
"5Client:tetex-fonts-0:3.0-33.1.el5.x86_64",
"5Client:tetex-latex-0:3.0-33.1.el5.i386",
"5Client:tetex-latex-0:3.0-33.1.el5.ia64",
"5Client:tetex-latex-0:3.0-33.1.el5.ppc",
"5Client:tetex-latex-0:3.0-33.1.el5.s390x",
"5Client:tetex-latex-0:3.0-33.1.el5.x86_64",
"5Client:tetex-xdvi-0:3.0-33.1.el5.i386",
"5Client:tetex-xdvi-0:3.0-33.1.el5.ia64",
"5Client:tetex-xdvi-0:3.0-33.1.el5.ppc",
"5Client:tetex-xdvi-0:3.0-33.1.el5.s390x",
"5Client:tetex-xdvi-0:3.0-33.1.el5.x86_64",
"5Server:tetex-0:3.0-33.1.el5.i386",
"5Server:tetex-0:3.0-33.1.el5.ia64",
"5Server:tetex-0:3.0-33.1.el5.ppc",
"5Server:tetex-0:3.0-33.1.el5.s390x",
"5Server:tetex-0:3.0-33.1.el5.src",
"5Server:tetex-0:3.0-33.1.el5.x86_64",
"5Server:tetex-afm-0:3.0-33.1.el5.i386",
"5Server:tetex-afm-0:3.0-33.1.el5.ia64",
"5Server:tetex-afm-0:3.0-33.1.el5.ppc",
"5Server:tetex-afm-0:3.0-33.1.el5.s390x",
"5Server:tetex-afm-0:3.0-33.1.el5.x86_64",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.i386",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.ia64",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.ppc",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.s390x",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"5Server:tetex-doc-0:3.0-33.1.el5.i386",
"5Server:tetex-doc-0:3.0-33.1.el5.ia64",
"5Server:tetex-doc-0:3.0-33.1.el5.ppc",
"5Server:tetex-doc-0:3.0-33.1.el5.s390x",
"5Server:tetex-doc-0:3.0-33.1.el5.x86_64",
"5Server:tetex-dvips-0:3.0-33.1.el5.i386",
"5Server:tetex-dvips-0:3.0-33.1.el5.ia64",
"5Server:tetex-dvips-0:3.0-33.1.el5.ppc",
"5Server:tetex-dvips-0:3.0-33.1.el5.s390x",
"5Server:tetex-dvips-0:3.0-33.1.el5.x86_64",
"5Server:tetex-fonts-0:3.0-33.1.el5.i386",
"5Server:tetex-fonts-0:3.0-33.1.el5.ia64",
"5Server:tetex-fonts-0:3.0-33.1.el5.ppc",
"5Server:tetex-fonts-0:3.0-33.1.el5.s390x",
"5Server:tetex-fonts-0:3.0-33.1.el5.x86_64",
"5Server:tetex-latex-0:3.0-33.1.el5.i386",
"5Server:tetex-latex-0:3.0-33.1.el5.ia64",
"5Server:tetex-latex-0:3.0-33.1.el5.ppc",
"5Server:tetex-latex-0:3.0-33.1.el5.s390x",
"5Server:tetex-latex-0:3.0-33.1.el5.x86_64",
"5Server:tetex-xdvi-0:3.0-33.1.el5.i386",
"5Server:tetex-xdvi-0:3.0-33.1.el5.ia64",
"5Server:tetex-xdvi-0:3.0-33.1.el5.ppc",
"5Server:tetex-xdvi-0:3.0-33.1.el5.s390x",
"5Server:tetex-xdvi-0:3.0-33.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-08-01T09:46:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:tetex-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-0:1.0.7-38.5E.11.src",
"2.1AS:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1AS:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-0:1.0.7-38.5E.11.src",
"2.1AW:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1AW:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-0:1.0.7-38.5E.11.src",
"2.1ES:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1ES:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-0:1.0.7-38.5E.11.src",
"2.1WS:tetex-afm-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-afm-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-doc-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-doc-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-dvilj-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-dvips-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-dvips-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-fonts-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-fonts-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-latex-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-latex-0:1.0.7-38.5E.11.ia64",
"2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.i386",
"2.1WS:tetex-xdvi-0:1.0.7-38.5E.11.ia64",
"3AS:tetex-0:1.0.7-67.10.i386",
"3AS:tetex-0:1.0.7-67.10.ia64",
"3AS:tetex-0:1.0.7-67.10.ppc",
"3AS:tetex-0:1.0.7-67.10.s390",
"3AS:tetex-0:1.0.7-67.10.s390x",
"3AS:tetex-0:1.0.7-67.10.src",
"3AS:tetex-0:1.0.7-67.10.x86_64",
"3AS:tetex-afm-0:1.0.7-67.10.i386",
"3AS:tetex-afm-0:1.0.7-67.10.ia64",
"3AS:tetex-afm-0:1.0.7-67.10.ppc",
"3AS:tetex-afm-0:1.0.7-67.10.s390",
"3AS:tetex-afm-0:1.0.7-67.10.s390x",
"3AS:tetex-afm-0:1.0.7-67.10.x86_64",
"3AS:tetex-debuginfo-0:1.0.7-67.10.i386",
"3AS:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3AS:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3AS:tetex-debuginfo-0:1.0.7-67.10.s390",
"3AS:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3AS:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3AS:tetex-dvips-0:1.0.7-67.10.i386",
"3AS:tetex-dvips-0:1.0.7-67.10.ia64",
"3AS:tetex-dvips-0:1.0.7-67.10.ppc",
"3AS:tetex-dvips-0:1.0.7-67.10.s390",
"3AS:tetex-dvips-0:1.0.7-67.10.s390x",
"3AS:tetex-dvips-0:1.0.7-67.10.x86_64",
"3AS:tetex-fonts-0:1.0.7-67.10.i386",
"3AS:tetex-fonts-0:1.0.7-67.10.ia64",
"3AS:tetex-fonts-0:1.0.7-67.10.ppc",
"3AS:tetex-fonts-0:1.0.7-67.10.s390",
"3AS:tetex-fonts-0:1.0.7-67.10.s390x",
"3AS:tetex-fonts-0:1.0.7-67.10.x86_64",
"3AS:tetex-latex-0:1.0.7-67.10.i386",
"3AS:tetex-latex-0:1.0.7-67.10.ia64",
"3AS:tetex-latex-0:1.0.7-67.10.ppc",
"3AS:tetex-latex-0:1.0.7-67.10.s390",
"3AS:tetex-latex-0:1.0.7-67.10.s390x",
"3AS:tetex-latex-0:1.0.7-67.10.x86_64",
"3AS:tetex-xdvi-0:1.0.7-67.10.i386",
"3AS:tetex-xdvi-0:1.0.7-67.10.ia64",
"3AS:tetex-xdvi-0:1.0.7-67.10.ppc",
"3AS:tetex-xdvi-0:1.0.7-67.10.s390",
"3AS:tetex-xdvi-0:1.0.7-67.10.s390x",
"3AS:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-0:1.0.7-67.10.i386",
"3Desktop:tetex-0:1.0.7-67.10.ia64",
"3Desktop:tetex-0:1.0.7-67.10.ppc",
"3Desktop:tetex-0:1.0.7-67.10.s390",
"3Desktop:tetex-0:1.0.7-67.10.s390x",
"3Desktop:tetex-0:1.0.7-67.10.src",
"3Desktop:tetex-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-afm-0:1.0.7-67.10.i386",
"3Desktop:tetex-afm-0:1.0.7-67.10.ia64",
"3Desktop:tetex-afm-0:1.0.7-67.10.ppc",
"3Desktop:tetex-afm-0:1.0.7-67.10.s390",
"3Desktop:tetex-afm-0:1.0.7-67.10.s390x",
"3Desktop:tetex-afm-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.i386",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3Desktop:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-dvips-0:1.0.7-67.10.i386",
"3Desktop:tetex-dvips-0:1.0.7-67.10.ia64",
"3Desktop:tetex-dvips-0:1.0.7-67.10.ppc",
"3Desktop:tetex-dvips-0:1.0.7-67.10.s390",
"3Desktop:tetex-dvips-0:1.0.7-67.10.s390x",
"3Desktop:tetex-dvips-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-fonts-0:1.0.7-67.10.i386",
"3Desktop:tetex-fonts-0:1.0.7-67.10.ia64",
"3Desktop:tetex-fonts-0:1.0.7-67.10.ppc",
"3Desktop:tetex-fonts-0:1.0.7-67.10.s390",
"3Desktop:tetex-fonts-0:1.0.7-67.10.s390x",
"3Desktop:tetex-fonts-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-latex-0:1.0.7-67.10.i386",
"3Desktop:tetex-latex-0:1.0.7-67.10.ia64",
"3Desktop:tetex-latex-0:1.0.7-67.10.ppc",
"3Desktop:tetex-latex-0:1.0.7-67.10.s390",
"3Desktop:tetex-latex-0:1.0.7-67.10.s390x",
"3Desktop:tetex-latex-0:1.0.7-67.10.x86_64",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.i386",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.ia64",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.ppc",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.s390",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.s390x",
"3Desktop:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3ES:tetex-0:1.0.7-67.10.i386",
"3ES:tetex-0:1.0.7-67.10.ia64",
"3ES:tetex-0:1.0.7-67.10.ppc",
"3ES:tetex-0:1.0.7-67.10.s390",
"3ES:tetex-0:1.0.7-67.10.s390x",
"3ES:tetex-0:1.0.7-67.10.src",
"3ES:tetex-0:1.0.7-67.10.x86_64",
"3ES:tetex-afm-0:1.0.7-67.10.i386",
"3ES:tetex-afm-0:1.0.7-67.10.ia64",
"3ES:tetex-afm-0:1.0.7-67.10.ppc",
"3ES:tetex-afm-0:1.0.7-67.10.s390",
"3ES:tetex-afm-0:1.0.7-67.10.s390x",
"3ES:tetex-afm-0:1.0.7-67.10.x86_64",
"3ES:tetex-debuginfo-0:1.0.7-67.10.i386",
"3ES:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3ES:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3ES:tetex-debuginfo-0:1.0.7-67.10.s390",
"3ES:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3ES:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3ES:tetex-dvips-0:1.0.7-67.10.i386",
"3ES:tetex-dvips-0:1.0.7-67.10.ia64",
"3ES:tetex-dvips-0:1.0.7-67.10.ppc",
"3ES:tetex-dvips-0:1.0.7-67.10.s390",
"3ES:tetex-dvips-0:1.0.7-67.10.s390x",
"3ES:tetex-dvips-0:1.0.7-67.10.x86_64",
"3ES:tetex-fonts-0:1.0.7-67.10.i386",
"3ES:tetex-fonts-0:1.0.7-67.10.ia64",
"3ES:tetex-fonts-0:1.0.7-67.10.ppc",
"3ES:tetex-fonts-0:1.0.7-67.10.s390",
"3ES:tetex-fonts-0:1.0.7-67.10.s390x",
"3ES:tetex-fonts-0:1.0.7-67.10.x86_64",
"3ES:tetex-latex-0:1.0.7-67.10.i386",
"3ES:tetex-latex-0:1.0.7-67.10.ia64",
"3ES:tetex-latex-0:1.0.7-67.10.ppc",
"3ES:tetex-latex-0:1.0.7-67.10.s390",
"3ES:tetex-latex-0:1.0.7-67.10.s390x",
"3ES:tetex-latex-0:1.0.7-67.10.x86_64",
"3ES:tetex-xdvi-0:1.0.7-67.10.i386",
"3ES:tetex-xdvi-0:1.0.7-67.10.ia64",
"3ES:tetex-xdvi-0:1.0.7-67.10.ppc",
"3ES:tetex-xdvi-0:1.0.7-67.10.s390",
"3ES:tetex-xdvi-0:1.0.7-67.10.s390x",
"3ES:tetex-xdvi-0:1.0.7-67.10.x86_64",
"3WS:tetex-0:1.0.7-67.10.i386",
"3WS:tetex-0:1.0.7-67.10.ia64",
"3WS:tetex-0:1.0.7-67.10.ppc",
"3WS:tetex-0:1.0.7-67.10.s390",
"3WS:tetex-0:1.0.7-67.10.s390x",
"3WS:tetex-0:1.0.7-67.10.src",
"3WS:tetex-0:1.0.7-67.10.x86_64",
"3WS:tetex-afm-0:1.0.7-67.10.i386",
"3WS:tetex-afm-0:1.0.7-67.10.ia64",
"3WS:tetex-afm-0:1.0.7-67.10.ppc",
"3WS:tetex-afm-0:1.0.7-67.10.s390",
"3WS:tetex-afm-0:1.0.7-67.10.s390x",
"3WS:tetex-afm-0:1.0.7-67.10.x86_64",
"3WS:tetex-debuginfo-0:1.0.7-67.10.i386",
"3WS:tetex-debuginfo-0:1.0.7-67.10.ia64",
"3WS:tetex-debuginfo-0:1.0.7-67.10.ppc",
"3WS:tetex-debuginfo-0:1.0.7-67.10.s390",
"3WS:tetex-debuginfo-0:1.0.7-67.10.s390x",
"3WS:tetex-debuginfo-0:1.0.7-67.10.x86_64",
"3WS:tetex-dvips-0:1.0.7-67.10.i386",
"3WS:tetex-dvips-0:1.0.7-67.10.ia64",
"3WS:tetex-dvips-0:1.0.7-67.10.ppc",
"3WS:tetex-dvips-0:1.0.7-67.10.s390",
"3WS:tetex-dvips-0:1.0.7-67.10.s390x",
"3WS:tetex-dvips-0:1.0.7-67.10.x86_64",
"3WS:tetex-fonts-0:1.0.7-67.10.i386",
"3WS:tetex-fonts-0:1.0.7-67.10.ia64",
"3WS:tetex-fonts-0:1.0.7-67.10.ppc",
"3WS:tetex-fonts-0:1.0.7-67.10.s390",
"3WS:tetex-fonts-0:1.0.7-67.10.s390x",
"3WS:tetex-fonts-0:1.0.7-67.10.x86_64",
"3WS:tetex-latex-0:1.0.7-67.10.i386",
"3WS:tetex-latex-0:1.0.7-67.10.ia64",
"3WS:tetex-latex-0:1.0.7-67.10.ppc",
"3WS:tetex-latex-0:1.0.7-67.10.s390",
"3WS:tetex-latex-0:1.0.7-67.10.s390x",
"3WS:tetex-latex-0:1.0.7-67.10.x86_64",
"3WS:tetex-xdvi-0:1.0.7-67.10.i386",
"3WS:tetex-xdvi-0:1.0.7-67.10.ia64",
"3WS:tetex-xdvi-0:1.0.7-67.10.ppc",
"3WS:tetex-xdvi-0:1.0.7-67.10.s390",
"3WS:tetex-xdvi-0:1.0.7-67.10.s390x",
"3WS:tetex-xdvi-0:1.0.7-67.10.x86_64",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4AS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4AS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4Desktop:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4Desktop:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4ES:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4ES:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.src",
"4WS:tetex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-afm-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-debuginfo-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-doc-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-dvips-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-fonts-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-latex-0:2.0.2-22.0.1.EL4.8.x86_64",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.i386",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ia64",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.ppc",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.s390x",
"4WS:tetex-xdvi-0:2.0.2-22.0.1.EL4.8.x86_64",
"5Client:tetex-0:3.0-33.1.el5.i386",
"5Client:tetex-0:3.0-33.1.el5.ia64",
"5Client:tetex-0:3.0-33.1.el5.ppc",
"5Client:tetex-0:3.0-33.1.el5.s390x",
"5Client:tetex-0:3.0-33.1.el5.src",
"5Client:tetex-0:3.0-33.1.el5.x86_64",
"5Client:tetex-afm-0:3.0-33.1.el5.i386",
"5Client:tetex-afm-0:3.0-33.1.el5.ia64",
"5Client:tetex-afm-0:3.0-33.1.el5.ppc",
"5Client:tetex-afm-0:3.0-33.1.el5.s390x",
"5Client:tetex-afm-0:3.0-33.1.el5.x86_64",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.i386",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.ia64",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.ppc",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.s390x",
"5Client:tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"5Client:tetex-doc-0:3.0-33.1.el5.i386",
"5Client:tetex-doc-0:3.0-33.1.el5.ia64",
"5Client:tetex-doc-0:3.0-33.1.el5.ppc",
"5Client:tetex-doc-0:3.0-33.1.el5.s390x",
"5Client:tetex-doc-0:3.0-33.1.el5.x86_64",
"5Client:tetex-dvips-0:3.0-33.1.el5.i386",
"5Client:tetex-dvips-0:3.0-33.1.el5.ia64",
"5Client:tetex-dvips-0:3.0-33.1.el5.ppc",
"5Client:tetex-dvips-0:3.0-33.1.el5.s390x",
"5Client:tetex-dvips-0:3.0-33.1.el5.x86_64",
"5Client:tetex-fonts-0:3.0-33.1.el5.i386",
"5Client:tetex-fonts-0:3.0-33.1.el5.ia64",
"5Client:tetex-fonts-0:3.0-33.1.el5.ppc",
"5Client:tetex-fonts-0:3.0-33.1.el5.s390x",
"5Client:tetex-fonts-0:3.0-33.1.el5.x86_64",
"5Client:tetex-latex-0:3.0-33.1.el5.i386",
"5Client:tetex-latex-0:3.0-33.1.el5.ia64",
"5Client:tetex-latex-0:3.0-33.1.el5.ppc",
"5Client:tetex-latex-0:3.0-33.1.el5.s390x",
"5Client:tetex-latex-0:3.0-33.1.el5.x86_64",
"5Client:tetex-xdvi-0:3.0-33.1.el5.i386",
"5Client:tetex-xdvi-0:3.0-33.1.el5.ia64",
"5Client:tetex-xdvi-0:3.0-33.1.el5.ppc",
"5Client:tetex-xdvi-0:3.0-33.1.el5.s390x",
"5Client:tetex-xdvi-0:3.0-33.1.el5.x86_64",
"5Server:tetex-0:3.0-33.1.el5.i386",
"5Server:tetex-0:3.0-33.1.el5.ia64",
"5Server:tetex-0:3.0-33.1.el5.ppc",
"5Server:tetex-0:3.0-33.1.el5.s390x",
"5Server:tetex-0:3.0-33.1.el5.src",
"5Server:tetex-0:3.0-33.1.el5.x86_64",
"5Server:tetex-afm-0:3.0-33.1.el5.i386",
"5Server:tetex-afm-0:3.0-33.1.el5.ia64",
"5Server:tetex-afm-0:3.0-33.1.el5.ppc",
"5Server:tetex-afm-0:3.0-33.1.el5.s390x",
"5Server:tetex-afm-0:3.0-33.1.el5.x86_64",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.i386",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.ia64",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.ppc",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.s390x",
"5Server:tetex-debuginfo-0:3.0-33.1.el5.x86_64",
"5Server:tetex-doc-0:3.0-33.1.el5.i386",
"5Server:tetex-doc-0:3.0-33.1.el5.ia64",
"5Server:tetex-doc-0:3.0-33.1.el5.ppc",
"5Server:tetex-doc-0:3.0-33.1.el5.s390x",
"5Server:tetex-doc-0:3.0-33.1.el5.x86_64",
"5Server:tetex-dvips-0:3.0-33.1.el5.i386",
"5Server:tetex-dvips-0:3.0-33.1.el5.ia64",
"5Server:tetex-dvips-0:3.0-33.1.el5.ppc",
"5Server:tetex-dvips-0:3.0-33.1.el5.s390x",
"5Server:tetex-dvips-0:3.0-33.1.el5.x86_64",
"5Server:tetex-fonts-0:3.0-33.1.el5.i386",
"5Server:tetex-fonts-0:3.0-33.1.el5.ia64",
"5Server:tetex-fonts-0:3.0-33.1.el5.ppc",
"5Server:tetex-fonts-0:3.0-33.1.el5.s390x",
"5Server:tetex-fonts-0:3.0-33.1.el5.x86_64",
"5Server:tetex-latex-0:3.0-33.1.el5.i386",
"5Server:tetex-latex-0:3.0-33.1.el5.ia64",
"5Server:tetex-latex-0:3.0-33.1.el5.ppc",
"5Server:tetex-latex-0:3.0-33.1.el5.s390x",
"5Server:tetex-latex-0:3.0-33.1.el5.x86_64",
"5Server:tetex-xdvi-0:3.0-33.1.el5.i386",
"5Server:tetex-xdvi-0:3.0-33.1.el5.ia64",
"5Server:tetex-xdvi-0:3.0-33.1.el5.ppc",
"5Server:tetex-xdvi-0:3.0-33.1.el5.s390x",
"5Server:tetex-xdvi-0:3.0-33.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0731"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
RHSA-2007:0735
Vulnerability from csaf_redhat - Published: 2007-07-30 18:20 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xpdf packages that fix a security issue in PDF handling are\nnow available for Red Hat Enterprise Linux 2.1, 3, and 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Xpdf is an X Window System-based viewer for Portable Document Format (PDF)\nfiles. \n\nMaurycy Prodeus discovered an integer overflow flaw in the processing\nof PDF files. An attacker could create a malicious PDF file that would\ncause Xpdf to crash or potentially execute arbitrary code when opened. \n(CVE-2007-3387)\n\nAll users of Xpdf should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0735",
"url": "https://access.redhat.com/errata/RHSA-2007:0735"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0735.json"
}
],
"title": "Red Hat Security Advisory: xpdf security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:05+00:00",
"generator": {
"date": "2025-11-21T17:32:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0735",
"initial_release_date": "2007-07-30T18:20:00+00:00",
"revision_history": [
{
"date": "2007-07-30T18:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T14:03:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Linux Advanced Workstation 2.1",
"product": {
"name": "Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-1:0.92-18.RHEL2.ia64",
"product": {
"name": "xpdf-1:0.92-18.RHEL2.ia64",
"product_id": "xpdf-1:0.92-18.RHEL2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@0.92-18.RHEL2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.ia64",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.ia64",
"product_id": "xpdf-1:3.00-12.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.ia64",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.ia64",
"product_id": "xpdf-1:2.02-10.RHEL3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=ia64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-1:0.92-18.RHEL2.src",
"product": {
"name": "xpdf-1:0.92-18.RHEL2.src",
"product_id": "xpdf-1:0.92-18.RHEL2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@0.92-18.RHEL2?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.src",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.src",
"product_id": "xpdf-1:3.00-12.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.src",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.src",
"product_id": "xpdf-1:2.02-10.RHEL3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-1:0.92-18.RHEL2.i386",
"product": {
"name": "xpdf-1:0.92-18.RHEL2.i386",
"product_id": "xpdf-1:0.92-18.RHEL2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@0.92-18.RHEL2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.i386",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.i386",
"product_id": "xpdf-1:3.00-12.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.i386",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.i386",
"product_id": "xpdf-1:2.02-10.RHEL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.x86_64",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.x86_64",
"product_id": "xpdf-1:3.00-12.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.x86_64",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.x86_64",
"product_id": "xpdf-1:2.02-10.RHEL3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.ppc",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.ppc",
"product_id": "xpdf-1:3.00-12.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.ppc",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.ppc",
"product_id": "xpdf-1:2.02-10.RHEL3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.s390x",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.s390x",
"product_id": "xpdf-1:3.00-12.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.s390x",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.s390x",
"product_id": "xpdf-1:2.02-10.RHEL3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"product": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"product_id": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-12.RHEL4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:3.00-12.RHEL4.s390",
"product": {
"name": "xpdf-1:3.00-12.RHEL4.s390",
"product_id": "xpdf-1:3.00-12.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@3.00-12.RHEL4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-1:2.02-10.RHEL3.s390",
"product": {
"name": "xpdf-1:2.02-10.RHEL3.s390",
"product_id": "xpdf-1:2.02-10.RHEL3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf@2.02-10.RHEL3?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"product": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"product_id": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-10.RHEL3?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:xpdf-1:0.92-18.RHEL2.i386"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:xpdf-1:0.92-18.RHEL2.ia64"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.ia64",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:xpdf-1:0.92-18.RHEL2.src"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.i386 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:xpdf-1:0.92-18.RHEL2.i386"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.i386",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:xpdf-1:0.92-18.RHEL2.ia64"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.ia64",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.src as a component of Red Hat Linux Advanced Workstation 2.1",
"product_id": "2.1AW:xpdf-1:0.92-18.RHEL2.src"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.src",
"relates_to_product_reference": "2.1AW"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:xpdf-1:0.92-18.RHEL2.i386"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:xpdf-1:0.92-18.RHEL2.ia64"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.ia64",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:xpdf-1:0.92-18.RHEL2.src"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:xpdf-1:0.92-18.RHEL2.i386"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:xpdf-1:0.92-18.RHEL2.ia64"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.ia64",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:0.92-18.RHEL2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:xpdf-1:0.92-18.RHEL2.src"
},
"product_reference": "xpdf-1:0.92-18.RHEL2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.src"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.src"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.src"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.src"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.i386"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64"
},
"product_reference": "xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.src"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.src"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.src"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.src"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.i386"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
},
"product_reference": "xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:xpdf-1:0.92-18.RHEL2.i386",
"2.1AS:xpdf-1:0.92-18.RHEL2.ia64",
"2.1AS:xpdf-1:0.92-18.RHEL2.src",
"2.1AW:xpdf-1:0.92-18.RHEL2.i386",
"2.1AW:xpdf-1:0.92-18.RHEL2.ia64",
"2.1AW:xpdf-1:0.92-18.RHEL2.src",
"2.1ES:xpdf-1:0.92-18.RHEL2.i386",
"2.1ES:xpdf-1:0.92-18.RHEL2.ia64",
"2.1ES:xpdf-1:0.92-18.RHEL2.src",
"2.1WS:xpdf-1:0.92-18.RHEL2.i386",
"2.1WS:xpdf-1:0.92-18.RHEL2.ia64",
"2.1WS:xpdf-1:0.92-18.RHEL2.src",
"3AS:xpdf-1:2.02-10.RHEL3.i386",
"3AS:xpdf-1:2.02-10.RHEL3.ia64",
"3AS:xpdf-1:2.02-10.RHEL3.ppc",
"3AS:xpdf-1:2.02-10.RHEL3.s390",
"3AS:xpdf-1:2.02-10.RHEL3.s390x",
"3AS:xpdf-1:2.02-10.RHEL3.src",
"3AS:xpdf-1:2.02-10.RHEL3.x86_64",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3Desktop:xpdf-1:2.02-10.RHEL3.i386",
"3Desktop:xpdf-1:2.02-10.RHEL3.ia64",
"3Desktop:xpdf-1:2.02-10.RHEL3.ppc",
"3Desktop:xpdf-1:2.02-10.RHEL3.s390",
"3Desktop:xpdf-1:2.02-10.RHEL3.s390x",
"3Desktop:xpdf-1:2.02-10.RHEL3.src",
"3Desktop:xpdf-1:2.02-10.RHEL3.x86_64",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3ES:xpdf-1:2.02-10.RHEL3.i386",
"3ES:xpdf-1:2.02-10.RHEL3.ia64",
"3ES:xpdf-1:2.02-10.RHEL3.ppc",
"3ES:xpdf-1:2.02-10.RHEL3.s390",
"3ES:xpdf-1:2.02-10.RHEL3.s390x",
"3ES:xpdf-1:2.02-10.RHEL3.src",
"3ES:xpdf-1:2.02-10.RHEL3.x86_64",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3WS:xpdf-1:2.02-10.RHEL3.i386",
"3WS:xpdf-1:2.02-10.RHEL3.ia64",
"3WS:xpdf-1:2.02-10.RHEL3.ppc",
"3WS:xpdf-1:2.02-10.RHEL3.s390",
"3WS:xpdf-1:2.02-10.RHEL3.s390x",
"3WS:xpdf-1:2.02-10.RHEL3.src",
"3WS:xpdf-1:2.02-10.RHEL3.x86_64",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"4AS:xpdf-1:3.00-12.RHEL4.i386",
"4AS:xpdf-1:3.00-12.RHEL4.ia64",
"4AS:xpdf-1:3.00-12.RHEL4.ppc",
"4AS:xpdf-1:3.00-12.RHEL4.s390",
"4AS:xpdf-1:3.00-12.RHEL4.s390x",
"4AS:xpdf-1:3.00-12.RHEL4.src",
"4AS:xpdf-1:3.00-12.RHEL4.x86_64",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4Desktop:xpdf-1:3.00-12.RHEL4.i386",
"4Desktop:xpdf-1:3.00-12.RHEL4.ia64",
"4Desktop:xpdf-1:3.00-12.RHEL4.ppc",
"4Desktop:xpdf-1:3.00-12.RHEL4.s390",
"4Desktop:xpdf-1:3.00-12.RHEL4.s390x",
"4Desktop:xpdf-1:3.00-12.RHEL4.src",
"4Desktop:xpdf-1:3.00-12.RHEL4.x86_64",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4ES:xpdf-1:3.00-12.RHEL4.i386",
"4ES:xpdf-1:3.00-12.RHEL4.ia64",
"4ES:xpdf-1:3.00-12.RHEL4.ppc",
"4ES:xpdf-1:3.00-12.RHEL4.s390",
"4ES:xpdf-1:3.00-12.RHEL4.s390x",
"4ES:xpdf-1:3.00-12.RHEL4.src",
"4ES:xpdf-1:3.00-12.RHEL4.x86_64",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4WS:xpdf-1:3.00-12.RHEL4.i386",
"4WS:xpdf-1:3.00-12.RHEL4.ia64",
"4WS:xpdf-1:3.00-12.RHEL4.ppc",
"4WS:xpdf-1:3.00-12.RHEL4.s390",
"4WS:xpdf-1:3.00-12.RHEL4.s390x",
"4WS:xpdf-1:3.00-12.RHEL4.src",
"4WS:xpdf-1:3.00-12.RHEL4.x86_64",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-07-30T18:20:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:xpdf-1:0.92-18.RHEL2.i386",
"2.1AS:xpdf-1:0.92-18.RHEL2.ia64",
"2.1AS:xpdf-1:0.92-18.RHEL2.src",
"2.1AW:xpdf-1:0.92-18.RHEL2.i386",
"2.1AW:xpdf-1:0.92-18.RHEL2.ia64",
"2.1AW:xpdf-1:0.92-18.RHEL2.src",
"2.1ES:xpdf-1:0.92-18.RHEL2.i386",
"2.1ES:xpdf-1:0.92-18.RHEL2.ia64",
"2.1ES:xpdf-1:0.92-18.RHEL2.src",
"2.1WS:xpdf-1:0.92-18.RHEL2.i386",
"2.1WS:xpdf-1:0.92-18.RHEL2.ia64",
"2.1WS:xpdf-1:0.92-18.RHEL2.src",
"3AS:xpdf-1:2.02-10.RHEL3.i386",
"3AS:xpdf-1:2.02-10.RHEL3.ia64",
"3AS:xpdf-1:2.02-10.RHEL3.ppc",
"3AS:xpdf-1:2.02-10.RHEL3.s390",
"3AS:xpdf-1:2.02-10.RHEL3.s390x",
"3AS:xpdf-1:2.02-10.RHEL3.src",
"3AS:xpdf-1:2.02-10.RHEL3.x86_64",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3AS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3Desktop:xpdf-1:2.02-10.RHEL3.i386",
"3Desktop:xpdf-1:2.02-10.RHEL3.ia64",
"3Desktop:xpdf-1:2.02-10.RHEL3.ppc",
"3Desktop:xpdf-1:2.02-10.RHEL3.s390",
"3Desktop:xpdf-1:2.02-10.RHEL3.s390x",
"3Desktop:xpdf-1:2.02-10.RHEL3.src",
"3Desktop:xpdf-1:2.02-10.RHEL3.x86_64",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3Desktop:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3ES:xpdf-1:2.02-10.RHEL3.i386",
"3ES:xpdf-1:2.02-10.RHEL3.ia64",
"3ES:xpdf-1:2.02-10.RHEL3.ppc",
"3ES:xpdf-1:2.02-10.RHEL3.s390",
"3ES:xpdf-1:2.02-10.RHEL3.s390x",
"3ES:xpdf-1:2.02-10.RHEL3.src",
"3ES:xpdf-1:2.02-10.RHEL3.x86_64",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3ES:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"3WS:xpdf-1:2.02-10.RHEL3.i386",
"3WS:xpdf-1:2.02-10.RHEL3.ia64",
"3WS:xpdf-1:2.02-10.RHEL3.ppc",
"3WS:xpdf-1:2.02-10.RHEL3.s390",
"3WS:xpdf-1:2.02-10.RHEL3.s390x",
"3WS:xpdf-1:2.02-10.RHEL3.src",
"3WS:xpdf-1:2.02-10.RHEL3.x86_64",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.i386",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ia64",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.ppc",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.s390x",
"3WS:xpdf-debuginfo-1:2.02-10.RHEL3.x86_64",
"4AS:xpdf-1:3.00-12.RHEL4.i386",
"4AS:xpdf-1:3.00-12.RHEL4.ia64",
"4AS:xpdf-1:3.00-12.RHEL4.ppc",
"4AS:xpdf-1:3.00-12.RHEL4.s390",
"4AS:xpdf-1:3.00-12.RHEL4.s390x",
"4AS:xpdf-1:3.00-12.RHEL4.src",
"4AS:xpdf-1:3.00-12.RHEL4.x86_64",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4AS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4Desktop:xpdf-1:3.00-12.RHEL4.i386",
"4Desktop:xpdf-1:3.00-12.RHEL4.ia64",
"4Desktop:xpdf-1:3.00-12.RHEL4.ppc",
"4Desktop:xpdf-1:3.00-12.RHEL4.s390",
"4Desktop:xpdf-1:3.00-12.RHEL4.s390x",
"4Desktop:xpdf-1:3.00-12.RHEL4.src",
"4Desktop:xpdf-1:3.00-12.RHEL4.x86_64",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4Desktop:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4ES:xpdf-1:3.00-12.RHEL4.i386",
"4ES:xpdf-1:3.00-12.RHEL4.ia64",
"4ES:xpdf-1:3.00-12.RHEL4.ppc",
"4ES:xpdf-1:3.00-12.RHEL4.s390",
"4ES:xpdf-1:3.00-12.RHEL4.s390x",
"4ES:xpdf-1:3.00-12.RHEL4.src",
"4ES:xpdf-1:3.00-12.RHEL4.x86_64",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4ES:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64",
"4WS:xpdf-1:3.00-12.RHEL4.i386",
"4WS:xpdf-1:3.00-12.RHEL4.ia64",
"4WS:xpdf-1:3.00-12.RHEL4.ppc",
"4WS:xpdf-1:3.00-12.RHEL4.s390",
"4WS:xpdf-1:3.00-12.RHEL4.s390x",
"4WS:xpdf-1:3.00-12.RHEL4.src",
"4WS:xpdf-1:3.00-12.RHEL4.x86_64",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.i386",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ia64",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.ppc",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.s390x",
"4WS:xpdf-debuginfo-1:3.00-12.RHEL4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0735"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
RHSA-2007:0729
Vulnerability from csaf_redhat - Published: 2007-07-30 18:02 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kdegraphics packages that fix a security issue in PDF handling are\nnow available for Red Hat Enterprise Linux 4, and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kdegraphics packages contain applications for the K Desktop Environment\nincluding kpdf, a PDF file viewer.\n\nMaurycy Prodeus discovered an integer overflow flaw in the processing\nof PDF files. An attacker could create a malicious PDF file that would\ncause kpdf to crash or potentially execute arbitrary code when opened. \n(CVE-2007-3387)\n\nAll users of kdegraphics should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0729",
"url": "https://access.redhat.com/errata/RHSA-2007:0729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0729.json"
}
],
"title": "Red Hat Security Advisory: kdegraphics security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:04+00:00",
"generator": {
"date": "2025-11-21T17:32:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0729",
"initial_release_date": "2007-07-30T18:02:00+00:00",
"revision_history": [
{
"date": "2007-07-30T18:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:50:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_productivity:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-2.el5.src",
"product": {
"name": "kdegraphics-7:3.5.4-2.el5.src",
"product_id": "kdegraphics-7:3.5.4-2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-2.el5?arch=src\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.src",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.src",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"product": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"product_id": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-2.el5?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"product": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"product_id": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-2.el5?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-2.el5.x86_64",
"product": {
"name": "kdegraphics-7:3.5.4-2.el5.x86_64",
"product_id": "kdegraphics-7:3.5.4-2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-2.el5?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=x86_64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"product": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"product_id": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-2.el5?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"product": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"product_id": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-2.el5?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-2.el5.i386",
"product": {
"name": "kdegraphics-7:3.5.4-2.el5.i386",
"product_id": "kdegraphics-7:3.5.4-2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-2.el5?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=i386\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=ia64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=ia64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=ia64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=ppc\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=ppc\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=ppc\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=s390x\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"product": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"product_id": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-4.RHEL4?arch=s390\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"product": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"product_id": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-4.RHEL4?arch=s390\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"product": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"product_id": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.3.1-4.RHEL4?arch=s390\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.src"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.src"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.src"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.src"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-2.el5.src"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-2.el5.src"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-devel-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-devel-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-2.el5.src"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.src",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-2.el5.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"relates_to_product_reference": "5Server-DPAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.src",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.src",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.src",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.src",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.src",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-7:3.5.4-2.el5.src",
"5Client:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.src",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-07-30T18:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.src",
"4AS:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4AS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.src",
"4Desktop:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4Desktop:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.src",
"4ES:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4ES:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.src",
"4WS:kdegraphics-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-debuginfo-7:3.3.1-4.RHEL4.x86_64",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.i386",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ia64",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.ppc",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.s390x",
"4WS:kdegraphics-devel-7:3.3.1-4.RHEL4.x86_64",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.src",
"5Client-Workstation:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-7:3.5.4-2.el5.src",
"5Client:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Client:kdegraphics-devel-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.src",
"5Server-DPAS:kdegraphics-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-2.el5.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0729"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
RHSA-2007:0730
Vulnerability from csaf_redhat - Published: 2007-07-30 18:07 - Updated: 2025-11-21 17:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kdegraphics packages that fix a security issue in PDF handling are\nnow available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "gpdf is a GNOME based viewer for Portable Document Format (PDF) files. \n\nMaurycy Prodeus discovered an integer overflow flaw in the processing\nof PDF files. An attacker could create a malicious PDF file that would\ncause gpdf to crash or potentially execute arbitrary code when opened. \n(CVE-2007-3387)\n\nAll users of gpdf should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0730",
"url": "https://access.redhat.com/errata/RHSA-2007:0730"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0730.json"
}
],
"title": "Red Hat Security Advisory: gpdf security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:06+00:00",
"generator": {
"date": "2025-11-21T17:32:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0730",
"initial_release_date": "2007-07-30T18:07:00+00:00",
"revision_history": [
{
"date": "2007-07-30T18:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-07T17:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.ia64",
"product": {
"name": "gpdf-0:2.8.2-7.7.ia64",
"product_id": "gpdf-0:2.8.2-7.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.x86_64",
"product": {
"name": "gpdf-0:2.8.2-7.7.x86_64",
"product_id": "gpdf-0:2.8.2-7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.i386",
"product": {
"name": "gpdf-0:2.8.2-7.7.i386",
"product_id": "gpdf-0:2.8.2-7.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.src",
"product": {
"name": "gpdf-0:2.8.2-7.7.src",
"product_id": "gpdf-0:2.8.2-7.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.ppc",
"product": {
"name": "gpdf-0:2.8.2-7.7.ppc",
"product_id": "gpdf-0:2.8.2-7.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.s390x",
"product": {
"name": "gpdf-0:2.8.2-7.7.s390x",
"product_id": "gpdf-0:2.8.2-7.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"product": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"product_id": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "gpdf-0:2.8.2-7.7.s390",
"product": {
"name": "gpdf-0:2.8.2-7.7.s390",
"product_id": "gpdf-0:2.8.2-7.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.src"
},
"product_reference": "gpdf-0:2.8.2-7.7.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.src"
},
"product_reference": "gpdf-0:2.8.2-7.7.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.src"
},
"product_reference": "gpdf-0:2.8.2-7.7.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.src"
},
"product_reference": "gpdf-0:2.8.2-7.7.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.i386"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.ia64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.ppc"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.s390"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.s390x"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gpdf-debuginfo-0:2.8.2-7.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
},
"product_reference": "gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-3387",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "248194"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xpdf integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:gpdf-0:2.8.2-7.7.i386",
"4AS:gpdf-0:2.8.2-7.7.ia64",
"4AS:gpdf-0:2.8.2-7.7.ppc",
"4AS:gpdf-0:2.8.2-7.7.s390",
"4AS:gpdf-0:2.8.2-7.7.s390x",
"4AS:gpdf-0:2.8.2-7.7.src",
"4AS:gpdf-0:2.8.2-7.7.x86_64",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4Desktop:gpdf-0:2.8.2-7.7.i386",
"4Desktop:gpdf-0:2.8.2-7.7.ia64",
"4Desktop:gpdf-0:2.8.2-7.7.ppc",
"4Desktop:gpdf-0:2.8.2-7.7.s390",
"4Desktop:gpdf-0:2.8.2-7.7.s390x",
"4Desktop:gpdf-0:2.8.2-7.7.src",
"4Desktop:gpdf-0:2.8.2-7.7.x86_64",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4ES:gpdf-0:2.8.2-7.7.i386",
"4ES:gpdf-0:2.8.2-7.7.ia64",
"4ES:gpdf-0:2.8.2-7.7.ppc",
"4ES:gpdf-0:2.8.2-7.7.s390",
"4ES:gpdf-0:2.8.2-7.7.s390x",
"4ES:gpdf-0:2.8.2-7.7.src",
"4ES:gpdf-0:2.8.2-7.7.x86_64",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4WS:gpdf-0:2.8.2-7.7.i386",
"4WS:gpdf-0:2.8.2-7.7.ia64",
"4WS:gpdf-0:2.8.2-7.7.ppc",
"4WS:gpdf-0:2.8.2-7.7.s390",
"4WS:gpdf-0:2.8.2-7.7.s390x",
"4WS:gpdf-0:2.8.2-7.7.src",
"4WS:gpdf-0:2.8.2-7.7.x86_64",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "RHBZ#248194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=248194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
}
],
"release_date": "2007-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-07-30T18:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:gpdf-0:2.8.2-7.7.i386",
"4AS:gpdf-0:2.8.2-7.7.ia64",
"4AS:gpdf-0:2.8.2-7.7.ppc",
"4AS:gpdf-0:2.8.2-7.7.s390",
"4AS:gpdf-0:2.8.2-7.7.s390x",
"4AS:gpdf-0:2.8.2-7.7.src",
"4AS:gpdf-0:2.8.2-7.7.x86_64",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4AS:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4Desktop:gpdf-0:2.8.2-7.7.i386",
"4Desktop:gpdf-0:2.8.2-7.7.ia64",
"4Desktop:gpdf-0:2.8.2-7.7.ppc",
"4Desktop:gpdf-0:2.8.2-7.7.s390",
"4Desktop:gpdf-0:2.8.2-7.7.s390x",
"4Desktop:gpdf-0:2.8.2-7.7.src",
"4Desktop:gpdf-0:2.8.2-7.7.x86_64",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4Desktop:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4ES:gpdf-0:2.8.2-7.7.i386",
"4ES:gpdf-0:2.8.2-7.7.ia64",
"4ES:gpdf-0:2.8.2-7.7.ppc",
"4ES:gpdf-0:2.8.2-7.7.s390",
"4ES:gpdf-0:2.8.2-7.7.s390x",
"4ES:gpdf-0:2.8.2-7.7.src",
"4ES:gpdf-0:2.8.2-7.7.x86_64",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4ES:gpdf-debuginfo-0:2.8.2-7.7.x86_64",
"4WS:gpdf-0:2.8.2-7.7.i386",
"4WS:gpdf-0:2.8.2-7.7.ia64",
"4WS:gpdf-0:2.8.2-7.7.ppc",
"4WS:gpdf-0:2.8.2-7.7.s390",
"4WS:gpdf-0:2.8.2-7.7.s390x",
"4WS:gpdf-0:2.8.2-7.7.src",
"4WS:gpdf-0:2.8.2-7.7.x86_64",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.i386",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.ia64",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.ppc",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.s390",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.s390x",
"4WS:gpdf-debuginfo-0:2.8.2-7.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0730"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xpdf integer overflow"
}
]
}
GSD-2007-3387
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-3387",
"description": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"id": "GSD-2007-3387",
"references": [
"https://www.suse.com/security/cve/CVE-2007-3387.html",
"https://www.debian.org/security/2007/dsa-1357",
"https://www.debian.org/security/2007/dsa-1354",
"https://www.debian.org/security/2007/dsa-1355",
"https://www.debian.org/security/2007/dsa-1352",
"https://www.debian.org/security/2007/dsa-1350",
"https://www.debian.org/security/2007/dsa-1349",
"https://www.debian.org/security/2007/dsa-1347",
"https://www.debian.org/security/2007/dsa-1348",
"https://access.redhat.com/errata/RHSA-2007:0735",
"https://access.redhat.com/errata/RHSA-2007:0732",
"https://access.redhat.com/errata/RHSA-2007:0731",
"https://access.redhat.com/errata/RHSA-2007:0730",
"https://access.redhat.com/errata/RHSA-2007:0729",
"https://access.redhat.com/errata/RHSA-2007:0720",
"https://linux.oracle.com/cve/CVE-2007-3387.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-3387"
],
"details": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"id": "GSD-2007-3387",
"modified": "2023-12-13T01:21:41.535464Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3387",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.novell.com/linux/security/advisories/2007_15_sr.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch",
"refsource": "MISC",
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"name": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc",
"refsource": "MISC",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=187139",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194",
"refsource": "MISC",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"name": "http://osvdb.org/40127",
"refsource": "MISC",
"url": "http://osvdb.org/40127"
},
{
"name": "http://secunia.com/advisories/26188",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26188"
},
{
"name": "http://secunia.com/advisories/26251",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26251"
},
{
"name": "http://secunia.com/advisories/26254",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26254"
},
{
"name": "http://secunia.com/advisories/26255",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26255"
},
{
"name": "http://secunia.com/advisories/26257",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26257"
},
{
"name": "http://secunia.com/advisories/26278",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26278"
},
{
"name": "http://secunia.com/advisories/26281",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26281"
},
{
"name": "http://secunia.com/advisories/26283",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26283"
},
{
"name": "http://secunia.com/advisories/26292",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26292"
},
{
"name": "http://secunia.com/advisories/26293",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26293"
},
{
"name": "http://secunia.com/advisories/26297",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26297"
},
{
"name": "http://secunia.com/advisories/26307",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26307"
},
{
"name": "http://secunia.com/advisories/26318",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26318"
},
{
"name": "http://secunia.com/advisories/26325",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26325"
},
{
"name": "http://secunia.com/advisories/26342",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26342"
},
{
"name": "http://secunia.com/advisories/26343",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26343"
},
{
"name": "http://secunia.com/advisories/26358",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26358"
},
{
"name": "http://secunia.com/advisories/26365",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26365"
},
{
"name": "http://secunia.com/advisories/26370",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26370"
},
{
"name": "http://secunia.com/advisories/26395",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26395"
},
{
"name": "http://secunia.com/advisories/26403",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26403"
},
{
"name": "http://secunia.com/advisories/26405",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26405"
},
{
"name": "http://secunia.com/advisories/26407",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26407"
},
{
"name": "http://secunia.com/advisories/26410",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26410"
},
{
"name": "http://secunia.com/advisories/26413",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26413"
},
{
"name": "http://secunia.com/advisories/26425",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26425"
},
{
"name": "http://secunia.com/advisories/26432",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26432"
},
{
"name": "http://secunia.com/advisories/26436",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26436"
},
{
"name": "http://secunia.com/advisories/26467",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26467"
},
{
"name": "http://secunia.com/advisories/26468",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26468"
},
{
"name": "http://secunia.com/advisories/26470",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26470"
},
{
"name": "http://secunia.com/advisories/26514",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26514"
},
{
"name": "http://secunia.com/advisories/26607",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26607"
},
{
"name": "http://secunia.com/advisories/26627",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26627"
},
{
"name": "http://secunia.com/advisories/26862",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26862"
},
{
"name": "http://secunia.com/advisories/26982",
"refsource": "MISC",
"url": "http://secunia.com/advisories/26982"
},
{
"name": "http://secunia.com/advisories/27156",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27156"
},
{
"name": "http://secunia.com/advisories/27281",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27281"
},
{
"name": "http://secunia.com/advisories/27308",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27308"
},
{
"name": "http://secunia.com/advisories/27637",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27637"
},
{
"name": "http://secunia.com/advisories/30168",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30168"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200709-12.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200709-17.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200710-20.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200711-34.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200805-13.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882",
"refsource": "MISC",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=535497",
"refsource": "MISC",
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"name": "http://www.debian.org/security/2007/dsa-1347",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"name": "http://www.debian.org/security/2007/dsa-1348",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"name": "http://www.debian.org/security/2007/dsa-1349",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"name": "http://www.debian.org/security/2007/dsa-1350",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"name": "http://www.debian.org/security/2007/dsa-1352",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"name": "http://www.debian.org/security/2007/dsa-1354",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"name": "http://www.debian.org/security/2007/dsa-1355",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"name": "http://www.debian.org/security/2007/dsa-1357",
"refsource": "MISC",
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"name": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml",
"refsource": "MISC",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"name": "http://www.kde.org/info/security/advisory-20070730-1.txt",
"refsource": "MISC",
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"name": "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0720.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0729.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0730.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0731.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0732.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-0735.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"name": "http://www.securityfocus.com/archive/1/476508/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"name": "http://www.securityfocus.com/bid/25124",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/25124"
},
{
"name": "http://www.securitytracker.com/id?1018473",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1018473"
},
{
"name": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670",
"refsource": "MISC",
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"name": "http://www.ubuntu.com/usn/usn-496-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"name": "http://www.ubuntu.com/usn/usn-496-2",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"name": "http://www.vupen.com/english/advisories/2007/2704",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"name": "http://www.vupen.com/english/advisories/2007/2705",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"name": "https://issues.foresightlinux.org/browse/FL-471",
"refsource": "MISC",
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"name": "https://issues.rpath.com/browse/RPL-1596",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"name": "https://issues.rpath.com/browse/RPL-1604",
"refsource": "MISC",
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.5.91",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gpdf_project:gpdf:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-3387"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2007:0730",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"name": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=187139",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"name": "http://www.kde.org/info/security/advisory-20070730-1.txt",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"name": "https://issues.rpath.com/browse/RPL-1596",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"name": "https://issues.foresightlinux.org/browse/FL-471",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"name": "https://issues.rpath.com/browse/RPL-1604",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"name": "http://sourceforge.net/project/shownotes.php?release_id=535497",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"name": "DSA-1347",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"name": "DSA-1348",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"name": "DSA-1349",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"name": "DSA-1350",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"name": "DSA-1352",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"name": "DSA-1355",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"name": "DSA-1354",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"name": "DSA-1357",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"name": "GLSA-200709-12",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"name": "GLSA-200710-08",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"name": "GLSA-200710-20",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"name": "GLSA-200709-17",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"name": "GLSA-200711-34",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"name": "MDKSA-2007:162",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"name": "MDKSA-2007:158",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"name": "MDKSA-2007:159",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"name": "MDKSA-2007:160",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"name": "MDKSA-2007:161",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"name": "MDKSA-2007:163",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"name": "MDKSA-2007:164",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"name": "MDKSA-2007:165",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"name": "RHSA-2007:0720",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"name": "RHSA-2007:0729",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"name": "RHSA-2007:0732",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"name": "RHSA-2007:0735",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"name": "RHSA-2007:0731",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"name": "20070801-01-P",
"refsource": "SGI",
"tags": [
"Broken Link"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"name": "SSA:2007-222-05",
"refsource": "SLACKWARE",
"tags": [
"Third Party Advisory"
],
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"name": "SSA:2007-316-01",
"refsource": "SLACKWARE",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"name": "SUSE-SR:2007:015",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"name": "SUSE-SR:2007:016",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"name": "USN-496-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"name": "USN-496-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"name": "25124",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/25124"
},
{
"name": "1018473",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1018473"
},
{
"name": "26188",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26188"
},
{
"name": "26254",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26254"
},
{
"name": "26255",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26255"
},
{
"name": "26257",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26257"
},
{
"name": "26278",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26278"
},
{
"name": "26281",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26281"
},
{
"name": "26283",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26283"
},
{
"name": "26251",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26251"
},
{
"name": "26293",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26293"
},
{
"name": "26292",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26292"
},
{
"name": "26307",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26307"
},
{
"name": "26318",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26318"
},
{
"name": "26342",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26342"
},
{
"name": "26297",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26297"
},
{
"name": "26343",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26343"
},
{
"name": "26358",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26358"
},
{
"name": "26325",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26325"
},
{
"name": "26365",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26365"
},
{
"name": "26370",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26370"
},
{
"name": "26413",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26413"
},
{
"name": "26410",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26410"
},
{
"name": "26403",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26403"
},
{
"name": "26405",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26405"
},
{
"name": "26407",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26407"
},
{
"name": "26432",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26432"
},
{
"name": "26436",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26436"
},
{
"name": "26467",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26467"
},
{
"name": "26468",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26468"
},
{
"name": "26470",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26470"
},
{
"name": "26425",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26425"
},
{
"name": "26395",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26395"
},
{
"name": "26514",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26514"
},
{
"name": "26607",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26607"
},
{
"name": "26862",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26862"
},
{
"name": "27156",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27156"
},
{
"name": "27281",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27281"
},
{
"name": "27308",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27308"
},
{
"name": "27637",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27637"
},
{
"name": "26627",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26627"
},
{
"name": "26982",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26982"
},
{
"name": "GLSA-200805-13",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"name": "30168",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30168"
},
{
"name": "40127",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/40127"
},
{
"name": "ADV-2007-2704",
"refsource": "VUPEN",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"name": "ADV-2007-2705",
"refsource": "VUPEN",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"name": "oval:org.mitre.oval:def:11149",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
},
{
"name": "20070816 FLEA-2007-0046-1 cups",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"name": "20070814 FLEA-2007-0045-1 poppler",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"name": "20070814 FLEA-2007-0044-1 tetex tetex-dvips tetex-fonts",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2023-02-13T02:17Z",
"publishedDate": "2007-07-30T23:17Z"
}
}
}
GHSA-V25X-FRPW-QG4X
Vulnerability from github – Published: 2022-05-03 03:18 – Updated: 2022-05-03 03:18Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
{
"affected": [],
"aliases": [
"CVE-2007-3387"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-07-30T23:17:00Z",
"severity": "MODERATE"
},
"details": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"id": "GHSA-v25x-frpw-qg4x",
"modified": "2022-05-03T03:18:14Z",
"published": "2022-05-03T03:18:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3387"
},
{
"type": "WEB",
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"type": "WEB",
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"type": "WEB",
"url": "http://osvdb.org/40127"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26188"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26251"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26254"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26255"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26257"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26278"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26281"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26283"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26292"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26293"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26297"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26307"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26318"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26325"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26342"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26343"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26358"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26365"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26370"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26395"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26403"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26405"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26407"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26410"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26413"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26425"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26432"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26436"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26467"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26468"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26470"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26514"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26607"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26627"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26862"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26982"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27156"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27281"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27308"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27637"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30168"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"type": "WEB",
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"type": "WEB",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"type": "WEB",
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/25124"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1018473"
},
{
"type": "WEB",
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2705"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2007-3387
Vulnerability from fkie_nvd - Published: 2007-07-30 23:17 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch | Broken Link | |
| secalert@redhat.com | ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc | Broken Link | |
| secalert@redhat.com | http://bugs.gentoo.org/show_bug.cgi?id=187139 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | http://osvdb.org/40127 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/26188 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26251 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26254 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26255 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26257 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26278 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26281 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26283 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26292 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26293 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26297 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26307 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26318 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26325 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26342 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26343 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26358 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26365 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26370 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26395 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26403 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26405 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26407 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26410 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26413 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26425 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26432 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26436 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26467 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26468 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26470 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26514 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26607 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26627 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26862 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/26982 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27156 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27281 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27308 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/27637 | Third Party Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/30168 | Third Party Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200709-12.xml | Third Party Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200709-17.xml | Third Party Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200710-20.xml | Third Party Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200711-34.xml | Third Party Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200805-13.xml | Third Party Advisory | |
| secalert@redhat.com | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882 | Third Party Advisory | |
| secalert@redhat.com | http://sourceforge.net/project/shownotes.php?release_id=535497 | Broken Link | |
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1347 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1348 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1349 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1350 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1352 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1354 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1355 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2007/dsa-1357 | Third Party Advisory | |
| secalert@redhat.com | http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml | Third Party Advisory | |
| secalert@redhat.com | http://www.kde.org/info/security/advisory-20070730-1.txt | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:158 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:159 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:160 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:161 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:162 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:163 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:164 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDKSA-2007:165 | Third Party Advisory | |
| secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_15_sr.html | Broken Link | |
| secalert@redhat.com | http://www.novell.com/linux/security/advisories/2007_16_sr.html | Broken Link | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0720.html | Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0729.html | Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0730.html | Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0731.html | Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0732.html | Third Party Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2007-0735.html | Third Party Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/476508/100/0/threaded | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/476519/30/5400/threaded | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/476765/30/5340/threaded | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.securityfocus.com/bid/25124 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.securitytracker.com/id?1018473 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670 | Third Party Advisory | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-496-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-496-2 | Third Party Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/2704 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2007/2705 | Permissions Required, Third Party Advisory | |
| secalert@redhat.com | https://issues.foresightlinux.org/browse/FL-471 | Broken Link | |
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-1596 | Broken Link | |
| secalert@redhat.com | https://issues.rpath.com/browse/RPL-1604 | Broken Link | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=187139 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/40127 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26188 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26251 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26254 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26255 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26257 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26278 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26281 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26283 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26292 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26293 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26297 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26307 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26318 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26325 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26342 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26343 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26358 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26365 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26370 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26395 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26403 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26405 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26407 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26410 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26413 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26425 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26432 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26436 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26467 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26468 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26470 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26514 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26607 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26627 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26862 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26982 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27156 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27281 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27308 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27637 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30168 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200709-12.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200709-17.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200710-20.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200711-34.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200805-13.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/project/shownotes.php?release_id=535497 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1347 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1348 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1349 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1350 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1352 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1354 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1355 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2007/dsa-1357 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kde.org/info/security/advisory-20070730-1.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:158 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:159 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:160 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:161 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:162 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:163 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:164 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2007:165 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_15_sr.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/linux/security/advisories/2007_16_sr.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0720.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0729.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0730.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0731.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0732.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-0735.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/476508/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/476519/30/5400/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/476765/30/5340/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25124 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018473 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-496-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-496-2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2704 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2705 | Permissions Required, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.foresightlinux.org/browse/FL-471 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1596 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1604 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| apple | cups | * | |
| freedesktop | poppler | * | |
| gpdf_project | gpdf | * | |
| xpdfreader | xpdf | 3.02 | |
| debian | debian_linux | 3.1 | |
| debian | debian_linux | 4.0 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 6.10 | |
| canonical | ubuntu_linux | 7.04 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08916364-08F4-4416-B84E-2BDD2DC0A3EB",
"versionEndIncluding": "1.3.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B64EB12-180D-4943-93C5-D99E05DE8422",
"versionEndExcluding": "0.5.91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gpdf_project:gpdf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4AA11D-1589-49C3-AF7F-89C25F5E017B",
"versionEndExcluding": "2.8.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xpdfreader:xpdf:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "14CC22C3-4195-4207-AAA4-E72F22334517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function."
},
{
"lang": "es",
"value": "Un desbordamiento de enteros en la funci\u00f3n StreamPredictor::StreamPredictor en xpdf versi\u00f3n 3.02, tal como es usado en (1) poppler anterior a versi\u00f3n 0.5.91, (2) gpdf anterior a versi\u00f3n 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, ( 6) PDFedit, y otros productos, podr\u00edan permitir que los atacantes remotos ejecuten c\u00f3digo arbitrario por medio de un archivo PDF creado que causa un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, en la funci\u00f3n StreamPredictor::getNextLine."
}
],
"id": "CVE-2007-3387",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2007-07-30T23:17:00.000",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/40127"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26188"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26251"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26254"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26255"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26257"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26278"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26281"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26283"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26292"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26293"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26297"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26307"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26318"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26325"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26342"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26343"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26358"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26365"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26370"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26395"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26403"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26405"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26407"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26410"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26413"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26425"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26432"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26436"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26467"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26468"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26470"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26514"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26607"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26627"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26862"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26982"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27156"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27281"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27308"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27637"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30168"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/25124"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1018473"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/40127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26251"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26257"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26278"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26292"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26307"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26342"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26365"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26370"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26405"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26410"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26413"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26432"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26467"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26514"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26607"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26627"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/26982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27156"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27281"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27308"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/27637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/30168"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-401.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0720.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0729.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0730.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0731.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0732.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0735.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/25124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1018473"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://issues.foresightlinux.org/browse/FL-471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1596"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://issues.rpath.com/browse/RPL-1604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2007-AVI-341
Vulnerability from certfr_avis - Published: 2007-08-01 - Updated: 2007-08-22
Un utilisateur malveillant pourrait, par le biais d'un document au format PDF spécialement conçu, exécuter du code arbitraire à distance.
Description
Dans la fonction StreamPredictor::StreamPredictor de gpdf, il est possible de provoquer un débordement d'entier. Ce problème permettrait à un utilisateur malveillant, par le biais d'un document au format PDF spécialement conçu, d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- gpdf versions antérieures à 2.8.2 ;
- applications dérivées ou utilisatrices, telles CUPS, kdegraphics, Xpdf, poppler.
Cette liste d'applications n'est pas limitative.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cUL\u003e \u003cLI\u003e\u003cSPAN class=\"textit\"\u003egpdf\u003c/SPAN\u003e versions ant\u00e9rieures \u00e0 2.8.2 ;\u003c/LI\u003e \u003cLI\u003eapplications d\u00e9riv\u00e9es ou utilisatrices, telles \u003cSPAN class=\n \"textit\"\u003eCUPS\u003c/SPAN\u003e, \u003cSPAN class=\"textit\"\u003ekdegraphics\u003c/SPAN\u003e, \u003cSPAN class=\"textit\"\u003eXpdf\u003c/SPAN\u003e, \u003cSPAN class=\n \"textit\"\u003epoppler\u003c/SPAN\u003e.\u003c/LI\u003e \u003c/UL\u003e \u003cP\u003eCette liste d\u0027applications n\u0027est pas limitative.\u003c/P\u003e",
"content": "## Description\n\nDans la fonction StreamPredictor::StreamPredictor de gpdf, il est\npossible de provoquer un d\u00e9bordement d\u0027entier. Ce probl\u00e8me permettrait \u00e0\nun utilisateur malveillant, par le biais d\u0027un document au format PDF\nsp\u00e9cialement con\u00e7u, d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
}
],
"initial_release_date": "2007-08-01T00:00:00",
"last_revision_date": "2007-08-22T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1352 du 07 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:163 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:160 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:160"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:016 du 10 ao\u00fbt 2007 :",
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0731 du 01 ao\u00fbt 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0731.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0732 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0732.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:158 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-496-1 du 07 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1354 du 13 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHatKDE du 30 juillet 2007 :",
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:165 du 15 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:165"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1355 du 13 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:162 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0730 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0730.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SR:2007:015 du 03 ao\u00fbt 2007 :",
"url": "http://lists.opensuse.org/opensuse-security-announce/2007-08/msg00003.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-496-2 du 07 ao\u00fbt 2007 :",
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0729 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0729.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1350 du 06 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1347 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1348 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1349 du 04 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1357 du 19 ao\u00fbt 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:164 du 14 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2007:161 du 13 ao\u00fbt 2007 :",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0735 du 30 juillet 2007 : http://rhn.redhat.com/errata/RHSA-2007-0735.html",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0732.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:0720 du 30 juillet 2007 :",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0720.html"
}
],
"reference": "CERTA-2007-AVI-341",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-08-01T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandriva, Debian, SuSE, Red Hat.",
"revision_date": "2007-08-16T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2007-08-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Un utilisateur malveillant pourrait, par le biais d\u0027un document au\nformat PDF sp\u00e9cialement con\u00e7u, ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans gpdf et d\u00e9riv\u00e9s",
"vendor_advisories": [
{
"published_at": null,
"title": "CVE-2007-3387",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3387"
}
]
}
VAR-200707-0577
Vulnerability from variot - Updated: 2025-12-22 21:52Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function. KDE kpdf, kword, and xpdf are prone to a stack-based buffer-overflow vulnerability because the applications fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application or cause the affected application to crash, denying service to legitimate users. ** REJECTED ** Do not use this application number. ConsultIDs: CVE-2007-3387. Reason: This application number is a duplicate of CVE-2007-3387. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200709-17
http://security.gentoo.org/
Severity: Normal Title: teTeX: Multiple buffer overflows Date: September 27, 2007 Bugs: #170861, #182055, #188172 ID: 200709-17
Synopsis
Multiple vulnerabilities have been discovered in teTeX, allowing for user-assisted execution of arbitrary code.
Background
teTeX is a complete TeX distribution for editing documents.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/tetex < 3.0_p1-r4 >= 3.0_p1-r4
Description
Mark Richters discovered a buffer overflow in the open_sty() function in file mkind.c. Other vulnerabilities have also been discovered in the same file but might not be exploitable (CVE-2007-0650). Tetex also includes vulnerable code from GD library (GLSA 200708-05), and from Xpdf (CVE-2007-3387).
Impact
A remote attacker could entice a user to process a specially crafted PNG, GIF or PDF file, or to execute "makeindex" on an overly long filename. In both cases, this could lead to the remote execution of arbitrary code with the privileges of the user running the application.
Workaround
There is no known workaround at this time.
Resolution
All teTeX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r4"
References
[ 1 ] CVE-2007-0650 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650 [ 2 ] CVE-2007-3387 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 [ 3 ] GLSA-200708-05 http://www.gentoo.org/security/en/glsa/glsa-200708-05.xml
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200709-17.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
This update provides packages which are patched to prevent these issues. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGwM0emqjQ0CJFipgRAu3vAKDmsiefFpqDx6azTsk+bf6bjpIEEQCeIaMz WGhfTpiOik4jsvYLU0N5Xxo= =yMmF -----END PGP SIGNATURE-----
.
The oldstable distribution (sarge) doesn't include poppler.
For the stable distribution (etch) this problem has been fixed in version 0.4.5-5.1etch1.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your poppler packages.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.dsc
Size/MD5 checksum: 749 b1346c2cb4aee0ae1ca33ba060094007
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.diff.gz
Size/MD5 checksum: 482690 2f989d0448c2692300bd751bf522f5bd
http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5.orig.tar.gz
Size/MD5 checksum: 783752 2bb1c75aa3f9c42f0ba48b5492e6d32c
Alpha architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 773812 d76d764076316ae07e8087303cc30992
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 55132 cb35ceb01b25cdfc3f79442b3448d02b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 33820 a4a9c2b76f3701a78a9b14e970bb5ba1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 504252 a9026c228974e16e5d89a25042ad7318
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 42904 c9bdb4e29ddad178743b31e90713c000
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 30346 6955b6218af2165b20e231d25e804514
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_alpha.deb
Size/MD5 checksum: 86226 ec4c7750b60b527c1ffadcdccc2fc511
AMD64 architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 611808 4cf7b4f5c7913c534e137cde3a02f48d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 45814 24824bf98843df51422173dd1420ffcd
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 30766 9d5a8cac9a7c6988ed72134992cdad1b
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 456460 1efb9a77c4f2ac098e24d93adb45c9bf
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 41300 4b809ddb231c59b108002aac26b2478f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 29528 5d0c79cd1b94df97d21ecce34e8fdfc3
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_amd64.deb
Size/MD5 checksum: 83972 e0e8cd89085e72d350fd43e56021ced9
ARM architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 592632 63898117c4adef3f675f1b918d9aea82
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 44500 d5a82185b30a5e855a236a08395bcb21
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 30532 451a4ffa778a82ccd9dbe54f2f239c92
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 437908 0a6689b9a291458d022f9369650b7e17
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 39610 f2a40182a431d998a73a7c0dc40998a8
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 29242 58097f3bd8ce4c571f162b50ddfcec06
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_arm.deb
Size/MD5 checksum: 82498 7d3d731f89241c00b3107a1f2ad74ce8
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 573554 725e3b628ecfb382bfd9d75049d24f84
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 44092 93d59749719868c9e8e855ba5be957c1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 30104 d867bd597db2deb7a818780addad7c46
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 443208 3c98ad946f941c338ce310c4dd58974f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 40564 1d30a6edbb90f4ce1c477ed5be4e66f0
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 29336 ba2d26951c5f57b25319c00370f5d4d1
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_i386.deb
Size/MD5 checksum: 80734 4c162ed3aa37045dd23a9aaf97d62f7d
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 808452 36eddb1c87e228a10e040e4aa810dd9f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 54684 ee6598a0976411bc0642a18fbac9ec9f
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 33624 232ee172a92e67387fd0d2f0a85a44cc
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 613016 24b0da95fed8f02496f3bde2f16ff34d
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 47654 eb848894eda39ab7489a88cb31437ea1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 32046 62595c13e89cff5556267b8d154f6549
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_ia64.deb
Size/MD5 checksum: 105128 ba70646ab595919bb3624431170e9384
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 672040 1461dead73436314eb88935df1ae9b13
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 49638 7ee217f6d2f57a2e788092f1dfc7f0a3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 32002 90d28e7f4057ded75ca7cb7737cdce8e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 456562 fb22da4c7ea123176dcdb4021ed2dce4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 41234 c296d08bdf88d83c995f5051127b19ba
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 29720 c31f5aa7cc55fc91efc83213e06791c9
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mips.deb
Size/MD5 checksum: 86744 663cd6aa6d9ee644aa3274338f6e34e6
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 664562 a76a9ae04b3d9079316460dfd37541cf
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 49610 9c4bf1245c7b16b6b216bbcf621204b4
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 32034 fc77f927262ce430bcd065748b73ad66
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 444222 1d2caa1d87e4d0b43418949153943187
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 41046 070d0467544cb0581f0b3c133bad9d06
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 29680 e37a2a5a6c24e9417cd67db9897fd486
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mipsel.deb
Size/MD5 checksum: 86486 aef8e31c38421662f3a875eb10d686e5
PowerPC architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 651526 05cf43f123f3e547456cd8ab4469c609
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 47968 bfa6208065b64793934a43132c1421e3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 31240 4d570e4ed7ee00fcc509b211cc06cfa1
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 472044 5468d5759aab624d75a5ae5ec8f80ea3
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 42980 588a81cdeaf6331b5bdd03b72039aea8
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 31274 1e1dbc0e4eda9c8f69ff370110d1c294
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_powerpc.deb
Size/MD5 checksum: 89146 475c8547c2286342097e71ca8be5e8f9
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 621210 ed5404bd2125854397cbd66d833122ca
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 46662 f136bcbde244026bd7a5cb382909cf00
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 30396 48b3fdfa120eb49bb55fbb4dd61386cb
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 453426 267940fd3f7e641db873334b5bacc1fe
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 41518 c32030d7252d0e5b0a40988723e36239
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 29298 dd5bd8caf52912a5b5e4ebc3f1b1833f
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_s390.deb
Size/MD5 checksum: 80530 897b5056de7468e496e225668055d58a
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 582952 c2d24c1f0036704fe390e629d679c56a
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 44374 27e3b0f740919f3519f8cd1146b18f96
http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 30458 faccd537766990407a2720fe72ad437e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 443556 38ec6210f11c0c2e55c5b8d47dd5c17e
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 40288 3af24912658ddecae77870cba99d7ca6
http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 29122 00d80797d532b53164c3a6b62f78fc43
http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_sparc.deb
Size/MD5 checksum: 78120 5106a5323bfcf84b61ed6d0cc8203a27
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGtHkBXm3vHE4uyloRAuynAKCgWW4OTcuG40TFb8C60YtthFWl1ACfccAZ Y0s6KFcUQrACYB7XloHUbwA= =IkSZ -----END PGP SIGNATURE-----
.
TITLE: GNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA18375
VERIFY ADVISORY: http://secunia.com/advisories/18375/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: GNOME 2.x http://secunia.com/product/3277/
DESCRIPTION: Some vulnerabilities have been reported in GNOME gpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.
The vulnerabilities are caused due to the use of a vulnerable version of Xpdf.
For more information: SA18303
SOLUTION: Restrict use to trusted PDF files only.
Some Linux vendors have released updated packages.
OTHER REFERENCES: SA18303: http://secunia.com/advisories/18303/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200707-0577",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "7.04"
},
{
"model": "gpdf",
"scope": "lt",
"trust": 1.0,
"vendor": "gpdf",
"version": "2.8.2"
},
{
"model": "poppler",
"scope": "lt",
"trust": 1.0,
"vendor": "freedesktop",
"version": "0.5.91"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.10"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.06"
},
{
"model": "cups",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "1.3.11"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 1.0,
"vendor": "xpdfreader",
"version": "3.02"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.4.1"
},
{
"model": "linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "1.0"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.6.1"
},
{
"model": "enterprise linux es ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "suse linux open-xchange",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.1"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.5"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "appliance server hosting edition",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "1.0"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.3"
},
{
"model": "fuji",
"scope": null,
"trust": 0.3,
"vendor": "turbolinux",
"version": null
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.01"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "1.00"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.3"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.13"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.0.1"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.2.1"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.1"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux enterprise server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "5.0"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.22"
},
{
"model": "koffice beta3",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "pl2",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.0"
},
{
"model": "linux professional oss",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.12"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.0"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "8"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "2.0"
},
{
"model": "linux professional x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3"
},
{
"model": "suse linux retail solution",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.0"
},
{
"model": "linux enterprise server for s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "9.1"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "2.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "7.3"
},
{
"model": "appliance server workgroup edition",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "1.0"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "2.0.2"
},
{
"model": "linux enterprise server 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "suse linux standard server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.0"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "7.3"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "hat fedora core7",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10"
},
{
"model": "gpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "gnome",
"version": "2.8"
},
{
"model": "message networking mn",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"model": "open-enterprise-server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "0"
},
{
"model": "broker ftp server",
"scope": "eq",
"trust": 0.3,
"vendor": "transsoft",
"version": "8.0"
},
{
"model": "suse linux school server for i386",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "multimedia",
"scope": null,
"trust": 0.3,
"vendor": "turbolinux",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "6.1"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.20"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3x86"
},
{
"model": "koffice beta2",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.5.91"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5"
},
{
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.0"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.5.1"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.4.1"
},
{
"model": "linux professional x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.2"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "5.2"
},
{
"model": "linux ppc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.4"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.00"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.21"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "1.0"
},
{
"model": "kword",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.5.2"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.2.2"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1x86-64"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.4.3"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.03"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "5.3"
},
{
"model": "1pl1",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.0"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "1.01"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux foresight linux",
"scope": "eq",
"trust": 0.3,
"vendor": "foresight",
"version": "1.1"
},
{
"model": "cstetex",
"scope": "eq",
"trust": 0.3,
"vendor": "cstex",
"version": "2.0.2"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "messaging storage server",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3.5"
},
{
"model": "gnustep",
"scope": "eq",
"trust": 0.3,
"vendor": "gnustep",
"version": "0"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.7"
},
{
"model": "0a",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "1.0"
},
{
"model": "kword",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.4.2"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "1.0.6"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.2.3"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"model": "fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "0"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "1.0.7"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.4"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "7"
},
{
"model": "intuity lx",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "linux personal oss",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "linux personal x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.1"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "linux openexchange server",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "gpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "gnome",
"version": "2.1"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.2"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "2.0.1"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.2"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.3.2"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0x86-64"
},
{
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "linux personal x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10.2"
},
{
"model": "pdfedit",
"scope": "ne",
"trust": 0.3,
"vendor": "pdfedit",
"version": "0.3.2"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.3"
},
{
"model": "linux personal x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.02"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "3.0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1.4"
},
{
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0.0x64"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.16"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.4.2"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.4.2"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.4.1"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3.2"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.4.5"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.1"
},
{
"model": "and nitro187 guild ftpd rc5",
"scope": "eq",
"trust": 0.3,
"vendor": "drphibez",
"version": "1.1.19"
},
{
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0x86"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.01"
},
{
"model": "linux professional x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10.2"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.2.92"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.4-5"
},
{
"model": "koffice beta1",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3"
},
{
"model": "personal",
"scope": null,
"trust": 0.3,
"vendor": "turbolinux",
"version": null
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.4-2"
},
{
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"model": "linux enterprise sdk 10.sp1",
"scope": null,
"trust": 0.3,
"vendor": "suse",
"version": null
},
{
"model": "unitedlinux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "1.0"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "6.4"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "3.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "hat enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "tetex",
"scope": "eq",
"trust": 0.3,
"vendor": "tetex",
"version": "3.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "6.3"
},
{
"model": "linux ppc",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.3.2"
},
{
"model": "linux personal x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3"
},
{
"model": "office server",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1"
},
{
"model": "pdfedit",
"scope": "eq",
"trust": 0.3,
"vendor": "pdfedit",
"version": "0.3.1"
},
{
"model": "appliance server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "2.0"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.2"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.1"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.2.1"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.18"
},
{
"model": "advanced linux environment",
"scope": "eq",
"trust": 0.3,
"vendor": "sgi",
"version": "3.0"
},
{
"model": "linux enterprise server sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.3x86-64"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.2"
},
{
"model": "gpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "gnome",
"version": "2.8.3"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.1"
},
{
"model": "messaging storage server mss",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.0"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.2"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.1"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.5.3"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.5.4"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3.4"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "7.1"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.2.9"
},
{
"model": "f...",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10"
},
{
"model": "linux enterprise desktop sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "7.2"
},
{
"model": "enterprise linux ws ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.4"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.6"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.17"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3.3"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "1.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.4.1"
},
{
"model": "linux personal x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.2"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.0.4"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux enterprise server 9-sp3",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "linux ppc",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.5.2"
},
{
"model": "linux enterprise server for s/390",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.7"
},
{
"model": "software products cups rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.23"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "4"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.19"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "enterprise linux optional productivity application server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "linux personal",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.2"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2007.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.10"
},
{
"model": "gpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "gnome",
"version": "2.8.2"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.0"
},
{
"model": "ptex",
"scope": "eq",
"trust": 0.3,
"vendor": "ptex",
"version": "3.1.10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "10.0"
},
{
"model": "kword",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.4.1"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.0"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.0.2"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.3.1"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.14"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "7.04"
},
{
"model": "libextractor",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "0.4.2"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "2.1"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.2.10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "11.0"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.2"
},
{
"model": "messaging storage server mm3.0",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.1x86"
},
{
"model": "hat enterprise linux as ia64",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "2.1"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.10"
},
{
"model": "software products cups rc5",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.19"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "8.1"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.2"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.4"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.4-3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "6.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "kword",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.5"
},
{
"model": "intuity lx",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "xpdf",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.0.3"
},
{
"model": "home",
"scope": null,
"trust": 0.3,
"vendor": "turbolinux",
"version": null
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.0x86"
},
{
"model": "message networking",
"scope": null,
"trust": 0.3,
"vendor": "avaya",
"version": null
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.2"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.2"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.3.1"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "5.1"
},
{
"model": "software products cups rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.22"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.6"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.6"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "linux professional x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.1"
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0"
},
{
"model": "pl1",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "2.0.2"
},
{
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0"
},
{
"model": "(patch",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.0.12)"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "6.2"
},
{
"model": "novell linux pos",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"model": "linux office server",
"scope": null,
"trust": 0.3,
"vendor": "s u s e",
"version": null
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.1"
},
{
"model": "poppler",
"scope": "eq",
"trust": 0.3,
"vendor": "poppler",
"version": "0.4.2"
},
{
"model": "communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.23"
},
{
"model": "kdegraphics",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.4"
},
{
"model": "linux enterprise sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.4"
},
{
"model": "linux enterprise sdk",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "7.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "3.1"
},
{
"model": "linux professional",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.2"
},
{
"model": "suse linux openexchange server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "4.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.0.4-8"
},
{
"model": "pl3",
"scope": "eq",
"trust": 0.3,
"vendor": "xpdf",
"version": "3.0"
},
{
"model": "linux professional x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"model": "software products cups",
"scope": "eq",
"trust": 0.3,
"vendor": "easy",
"version": "1.1.15"
},
{
"model": "koffice",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "1.5"
}
],
"sources": [
{
"db": "BID",
"id": "25124"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Derek Noonburg is credited with the discovery of this vulnerability.",
"sources": [
{
"db": "BID",
"id": "25124"
}
],
"trust": 0.3
},
"cve": "CVE-2007-3387",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2007-3387",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-26749",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2007-3387",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-26749",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2007-3387",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function. KDE kpdf, kword, and xpdf are prone to a stack-based buffer-overflow vulnerability because the applications fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application or cause the affected application to crash, denying service to legitimate users. ** REJECTED ** Do not use this application number. ConsultIDs: CVE-2007-3387. Reason: This application number is a duplicate of CVE-2007-3387. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200709-17\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: teTeX: Multiple buffer overflows\n Date: September 27, 2007\n Bugs: #170861, #182055, #188172\n ID: 200709-17\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in teTeX, allowing for\nuser-assisted execution of arbitrary code. \n\nBackground\n==========\n\nteTeX is a complete TeX distribution for editing documents. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-text/tetex \u003c 3.0_p1-r4 \u003e= 3.0_p1-r4\n\nDescription\n===========\n\nMark Richters discovered a buffer overflow in the open_sty() function\nin file mkind.c. Other vulnerabilities have also been discovered in the\nsame file but might not be exploitable (CVE-2007-0650). Tetex also\nincludes vulnerable code from GD library (GLSA 200708-05), and from\nXpdf (CVE-2007-3387). \n\nImpact\n======\n\nA remote attacker could entice a user to process a specially crafted\nPNG, GIF or PDF file, or to execute \"makeindex\" on an overly long\nfilename. In both cases, this could lead to the remote execution of\narbitrary code with the privileges of the user running the application. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll teTeX users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-text/tetex-3.0_p1-r4\"\n\nReferences\n==========\n\n [ 1 ] CVE-2007-0650\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0650\n [ 2 ] CVE-2007-3387\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387\n [ 3 ] GLSA-200708-05\n http://www.gentoo.org/security/en/glsa/glsa-200708-05.xml\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200709-17.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2007 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n \n This update provides packages which are patched to prevent these\n issues. The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFGwM0emqjQ0CJFipgRAu3vAKDmsiefFpqDx6azTsk+bf6bjpIEEQCeIaMz\nWGhfTpiOik4jsvYLU0N5Xxo=\n=yMmF\n-----END PGP SIGNATURE-----\n\n. \n\nThe oldstable distribution (sarge) doesn\u0027t include poppler. \n\nFor the stable distribution (etch) this problem has been fixed in\nversion 0.4.5-5.1etch1. \n\nFor the unstable distribution (sid) this problem will be fixed soon. \n\nWe recommend that you upgrade your poppler packages. \n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given at the end of this advisory:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.dsc\n Size/MD5 checksum: 749 b1346c2cb4aee0ae1ca33ba060094007\n http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.diff.gz\n Size/MD5 checksum: 482690 2f989d0448c2692300bd751bf522f5bd\n http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5.orig.tar.gz\n Size/MD5 checksum: 783752 2bb1c75aa3f9c42f0ba48b5492e6d32c\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 773812 d76d764076316ae07e8087303cc30992\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 55132 cb35ceb01b25cdfc3f79442b3448d02b\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 33820 a4a9c2b76f3701a78a9b14e970bb5ba1\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 504252 a9026c228974e16e5d89a25042ad7318\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 42904 c9bdb4e29ddad178743b31e90713c000\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 30346 6955b6218af2165b20e231d25e804514\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_alpha.deb\n Size/MD5 checksum: 86226 ec4c7750b60b527c1ffadcdccc2fc511\n\n AMD64 architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 611808 4cf7b4f5c7913c534e137cde3a02f48d\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 45814 24824bf98843df51422173dd1420ffcd\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 30766 9d5a8cac9a7c6988ed72134992cdad1b\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 456460 1efb9a77c4f2ac098e24d93adb45c9bf\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 41300 4b809ddb231c59b108002aac26b2478f\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 29528 5d0c79cd1b94df97d21ecce34e8fdfc3\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_amd64.deb\n Size/MD5 checksum: 83972 e0e8cd89085e72d350fd43e56021ced9\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 592632 63898117c4adef3f675f1b918d9aea82\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 44500 d5a82185b30a5e855a236a08395bcb21\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 30532 451a4ffa778a82ccd9dbe54f2f239c92\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 437908 0a6689b9a291458d022f9369650b7e17\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 39610 f2a40182a431d998a73a7c0dc40998a8\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 29242 58097f3bd8ce4c571f162b50ddfcec06\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_arm.deb\n Size/MD5 checksum: 82498 7d3d731f89241c00b3107a1f2ad74ce8\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 573554 725e3b628ecfb382bfd9d75049d24f84\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 44092 93d59749719868c9e8e855ba5be957c1\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 30104 d867bd597db2deb7a818780addad7c46\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 443208 3c98ad946f941c338ce310c4dd58974f\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 40564 1d30a6edbb90f4ce1c477ed5be4e66f0\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 29336 ba2d26951c5f57b25319c00370f5d4d1\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_i386.deb\n Size/MD5 checksum: 80734 4c162ed3aa37045dd23a9aaf97d62f7d\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 808452 36eddb1c87e228a10e040e4aa810dd9f\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 54684 ee6598a0976411bc0642a18fbac9ec9f\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 33624 232ee172a92e67387fd0d2f0a85a44cc\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 613016 24b0da95fed8f02496f3bde2f16ff34d\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 47654 eb848894eda39ab7489a88cb31437ea1\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 32046 62595c13e89cff5556267b8d154f6549\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_ia64.deb\n Size/MD5 checksum: 105128 ba70646ab595919bb3624431170e9384\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 672040 1461dead73436314eb88935df1ae9b13\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 49638 7ee217f6d2f57a2e788092f1dfc7f0a3\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 32002 90d28e7f4057ded75ca7cb7737cdce8e\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 456562 fb22da4c7ea123176dcdb4021ed2dce4\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 41234 c296d08bdf88d83c995f5051127b19ba\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 29720 c31f5aa7cc55fc91efc83213e06791c9\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mips.deb\n Size/MD5 checksum: 86744 663cd6aa6d9ee644aa3274338f6e34e6\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 664562 a76a9ae04b3d9079316460dfd37541cf\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 49610 9c4bf1245c7b16b6b216bbcf621204b4\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 32034 fc77f927262ce430bcd065748b73ad66\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 444222 1d2caa1d87e4d0b43418949153943187\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 41046 070d0467544cb0581f0b3c133bad9d06\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 29680 e37a2a5a6c24e9417cd67db9897fd486\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mipsel.deb\n Size/MD5 checksum: 86486 aef8e31c38421662f3a875eb10d686e5\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 651526 05cf43f123f3e547456cd8ab4469c609\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 47968 bfa6208065b64793934a43132c1421e3\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 31240 4d570e4ed7ee00fcc509b211cc06cfa1\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 472044 5468d5759aab624d75a5ae5ec8f80ea3\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 42980 588a81cdeaf6331b5bdd03b72039aea8\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 31274 1e1dbc0e4eda9c8f69ff370110d1c294\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_powerpc.deb\n Size/MD5 checksum: 89146 475c8547c2286342097e71ca8be5e8f9\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 621210 ed5404bd2125854397cbd66d833122ca\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 46662 f136bcbde244026bd7a5cb382909cf00\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 30396 48b3fdfa120eb49bb55fbb4dd61386cb\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 453426 267940fd3f7e641db873334b5bacc1fe\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 41518 c32030d7252d0e5b0a40988723e36239\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 29298 dd5bd8caf52912a5b5e4ebc3f1b1833f\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_s390.deb\n Size/MD5 checksum: 80530 897b5056de7468e496e225668055d58a\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 582952 c2d24c1f0036704fe390e629d679c56a\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 44374 27e3b0f740919f3519f8cd1146b18f96\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 30458 faccd537766990407a2720fe72ad437e\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 443556 38ec6210f11c0c2e55c5b8d47dd5c17e\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 40288 3af24912658ddecae77870cba99d7ca6\n http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 29122 00d80797d532b53164c3a6b62f78fc43\n http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_sparc.deb\n Size/MD5 checksum: 78120 5106a5323bfcf84b61ed6d0cc8203a27\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFGtHkBXm3vHE4uyloRAuynAKCgWW4OTcuG40TFb8C60YtthFWl1ACfccAZ\nY0s6KFcUQrACYB7XloHUbwA=\n=IkSZ\n-----END PGP SIGNATURE-----\n\n\n\n\n. \n\nTITLE:\nGNOME gpdf Xpdf Multiple Integer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA18375\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/18375/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nGNOME 2.x\nhttp://secunia.com/product/3277/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in GNOME gpdf, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially to compromise a user\u0027s system. \n\nThe vulnerabilities are caused due to the use of a vulnerable version\nof Xpdf. \n\nFor more information:\nSA18303\n\nSOLUTION:\nRestrict use to trusted PDF files only. \n\nSome Linux vendors have released updated packages. \n\nOTHER REFERENCES:\nSA18303:\nhttp://secunia.com/advisories/18303/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-3387"
},
{
"db": "BID",
"id": "25124"
},
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"db": "PACKETSTORM",
"id": "58350"
},
{
"db": "PACKETSTORM",
"id": "59656"
},
{
"db": "PACKETSTORM",
"id": "58547"
},
{
"db": "PACKETSTORM",
"id": "58338"
},
{
"db": "PACKETSTORM",
"id": "42994"
},
{
"db": "PACKETSTORM",
"id": "58551"
}
],
"trust": 1.89
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-26749",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2007-3387",
"trust": 2.0
},
{
"db": "BID",
"id": "25124",
"trust": 1.5
},
{
"db": "SECUNIA",
"id": "26255",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26403",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26343",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26251",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26395",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26293",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26432",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26254",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26468",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "27308",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26425",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26281",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26627",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26470",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26607",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26467",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "30168",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26283",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "27156",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26188",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26410",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26318",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26982",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26278",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26413",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26342",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26297",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26407",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26405",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26365",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26325",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26292",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26307",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26436",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26514",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "27637",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26862",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26257",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26370",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "27281",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "26358",
"trust": 1.2
},
{
"db": "SECTRACK",
"id": "1018473",
"trust": 1.2
},
{
"db": "VUPEN",
"id": "ADV-2007-2705",
"trust": 1.2
},
{
"db": "VUPEN",
"id": "ADV-2007-2704",
"trust": 1.2
},
{
"db": "OSVDB",
"id": "40127",
"trust": 1.2
},
{
"db": "PACKETSTORM",
"id": "58338",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "58547",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "58350",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "58551",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "58327",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58361",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58337",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58521",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "60213",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58636",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58364",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "59962",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58628",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58578",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58345",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "59463",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58629",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58700",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58549",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58520",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58548",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-26749",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2007-3387",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "59656",
"trust": 0.1
},
{
"db": "SECUNIA",
"id": "18375",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "42994",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"db": "BID",
"id": "25124"
},
{
"db": "PACKETSTORM",
"id": "58350"
},
{
"db": "PACKETSTORM",
"id": "59656"
},
{
"db": "PACKETSTORM",
"id": "58547"
},
{
"db": "PACKETSTORM",
"id": "58338"
},
{
"db": "PACKETSTORM",
"id": "42994"
},
{
"db": "PACKETSTORM",
"id": "58551"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"id": "VAR-200707-0577",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T21:52:30.780000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Debian CVElist Bug Report Logs: CVE-2007-3387: Integer overflow in poppler",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=792dbd354e660d4ddde9b32b2f859033"
},
{
"title": "Ubuntu Security Notice: poppler vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-496-2"
},
{
"title": "Ubuntu Security Notice: koffice vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-496-1"
},
{
"title": "Debian Security Advisories: DSA-1352-1 pdfkit.framework -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0f4487a347f64fc7f409e6b4894881f4"
},
{
"title": "Debian Security Advisories: DSA-1349-1 libextractor -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=0e98b4a2c135eb56d6f0a69104e3e6f4"
},
{
"title": "Debian Security Advisories: DSA-1347-1 xpdf -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=e10406bf4a06790fe13abcea7d6f5f38"
},
{
"title": "Debian Security Advisories: DSA-1357-1 koffice -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=778c9a74b9e2febb57c49164f6665e80"
},
{
"title": "Debian Security Advisories: DSA-1348-1 poppler -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=d22b45bd7bcc22895e4f82e30b63c031"
},
{
"title": "Debian Security Advisories: DSA-1350-1 tetex-bin -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=954bf65bf99c6a9bed2d2657e0ca4ee1"
},
{
"title": "Debian Security Advisories: DSA-1354-1 gpdf -- integer overflow",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=57ed98a8faf775ede8cb746362fe5acd"
},
{
"title": "CVE-T4PDF\nTable of contents\nList of CVEs\nList of Techniques",
"trust": 0.1,
"url": "https://github.com/0xCyberY/CVE-T4PDF "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2007-3387"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-190",
"trust": 1.1
},
{
"problemtype": "CWE-189",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.5,
"url": "http://www.novell.com/linux/security/advisories/2007_16_sr.html"
},
{
"trust": 1.5,
"url": "http://sourceforge.net/project/shownotes.php?release_id=535497"
},
{
"trust": 1.5,
"url": "http://support.avaya.com/elmodocs2/security/asa-2007-401.htm"
},
{
"trust": 1.5,
"url": "http://www.kde.org/info/security/advisory-20070730-1.txt"
},
{
"trust": 1.3,
"url": "http://security.gentoo.org/glsa/glsa-200709-17.xml"
},
{
"trust": 1.2,
"url": "http://www.securitytracker.com/id?1018473"
},
{
"trust": 1.2,
"url": "ftp://patches.sgi.com/support/free/security/advisories/20070801-01-p.asc"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/476508/100/0/threaded"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/476519/30/5400/threaded"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/archive/1/476765/30/5340/threaded"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/25124"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26188"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26251"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26254"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26255"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26257"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26278"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26281"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26283"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26292"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26293"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26297"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26307"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26318"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26325"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26342"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26343"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26358"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26365"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26370"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26395"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26403"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26405"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26407"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26410"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26413"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26425"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26432"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26436"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26467"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26468"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26470"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26514"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26607"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26627"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26862"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/26982"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/27156"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/27281"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/27308"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/27637"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/30168"
},
{
"trust": 1.2,
"url": "http://osvdb.org/40127"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2007/2704"
},
{
"trust": 1.2,
"url": "http://www.vupen.com/english/advisories/2007/2705"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1347"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1348"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1349"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1350"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1352"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1354"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1355"
},
{
"trust": 1.2,
"url": "http://www.debian.org/security/2007/dsa-1357"
},
{
"trust": 1.2,
"url": "http://security.gentoo.org/glsa/glsa-200709-12.xml"
},
{
"trust": 1.2,
"url": "http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml"
},
{
"trust": 1.2,
"url": "http://security.gentoo.org/glsa/glsa-200710-20.xml"
},
{
"trust": 1.2,
"url": "http://security.gentoo.org/glsa/glsa-200711-34.xml"
},
{
"trust": 1.2,
"url": "http://security.gentoo.org/glsa/glsa-200805-13.xml"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:158"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:159"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:160"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:161"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:162"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:163"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:164"
},
{
"trust": 1.2,
"url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:165"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0720.html"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0729.html"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0730.html"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0731.html"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0732.html"
},
{
"trust": 1.2,
"url": "http://www.redhat.com/support/errata/rhsa-2007-0735.html"
},
{
"trust": 1.2,
"url": "http://www.novell.com/linux/security/advisories/2007_15_sr.html"
},
{
"trust": 1.2,
"url": "http://www.ubuntu.com/usn/usn-496-1"
},
{
"trust": 1.2,
"url": "http://www.ubuntu.com/usn/usn-496-2"
},
{
"trust": 1.2,
"url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch"
},
{
"trust": 1.2,
"url": "http://bugs.gentoo.org/show_bug.cgi?id=187139"
},
{
"trust": 1.2,
"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194"
},
{
"trust": 1.2,
"url": "https://issues.foresightlinux.org/browse/fl-471"
},
{
"trust": 1.2,
"url": "https://issues.rpath.com/browse/rpl-1596"
},
{
"trust": 1.2,
"url": "https://issues.rpath.com/browse/rpl-1604"
},
{
"trust": 1.2,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11149"
},
{
"trust": 1.1,
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.423670"
},
{
"trust": 1.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.761882"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-3387"
},
{
"trust": 0.3,
"url": "http://www.koffice.org/"
},
{
"trust": 0.3,
"url": "http://kpdf.kde.org/"
},
{
"trust": 0.3,
"url": "http://www.foolabs.com/xpdf/"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0720.html"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0729.html"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0730.html"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0731.html"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0732.html"
},
{
"trust": 0.3,
"url": "https://rhn.redhat.com/errata/rhsa-2007-0735.html"
},
{
"trust": 0.3,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3387"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.2,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.2,
"url": "http://security.debian.org/"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.2,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.2,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026amp;y=2007\u0026amp;m=slackware-security.423670"
},
{
"trust": 0.1,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2007\u0026amp;m=slackware-security.761882"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/190.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=435460"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/496-2/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_m68k.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_2.0.2-30sarge5_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2-30sarge5_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_2.0.2-30sarge5_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_2.0.2.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0650"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-0650"
},
{
"trust": 0.1,
"url": "http://www.gentoo.org/security/en/glsa/glsa-200708-05.xml"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-dev_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5-5.1etch1.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler-utils_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-qt_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/poppler_0.4.5.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2_0.4.5-5.1etch1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-glib-dev_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler0c2-glib_0.4.5-5.1etch1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/p/poppler/libpoppler-qt-dev_0.4.5-5.1etch1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/18375/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/18303/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/3277/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"db": "BID",
"id": "25124"
},
{
"db": "PACKETSTORM",
"id": "58350"
},
{
"db": "PACKETSTORM",
"id": "59656"
},
{
"db": "PACKETSTORM",
"id": "58547"
},
{
"db": "PACKETSTORM",
"id": "58338"
},
{
"db": "PACKETSTORM",
"id": "42994"
},
{
"db": "PACKETSTORM",
"id": "58551"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-26749"
},
{
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"db": "BID",
"id": "25124"
},
{
"db": "PACKETSTORM",
"id": "58350"
},
{
"db": "PACKETSTORM",
"id": "59656"
},
{
"db": "PACKETSTORM",
"id": "58547"
},
{
"db": "PACKETSTORM",
"id": "58338"
},
{
"db": "PACKETSTORM",
"id": "42994"
},
{
"db": "PACKETSTORM",
"id": "58551"
},
{
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-07-30T00:00:00",
"db": "VULHUB",
"id": "VHN-26749"
},
{
"date": "2007-07-30T00:00:00",
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"date": "2007-07-30T00:00:00",
"db": "BID",
"id": "25124"
},
{
"date": "2007-08-08T07:28:34",
"db": "PACKETSTORM",
"id": "58350"
},
{
"date": "2007-09-28T01:34:55",
"db": "PACKETSTORM",
"id": "59656"
},
{
"date": "2007-08-14T17:42:47",
"db": "PACKETSTORM",
"id": "58547"
},
{
"date": "2007-08-08T07:05:49",
"db": "PACKETSTORM",
"id": "58338"
},
{
"date": "2006-01-12T00:49:01",
"db": "PACKETSTORM",
"id": "42994"
},
{
"date": "2007-08-14T17:46:34",
"db": "PACKETSTORM",
"id": "58551"
},
{
"date": "2007-07-30T23:17:00",
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-26749"
},
{
"date": "2023-02-13T00:00:00",
"db": "VULMON",
"id": "CVE-2007-3387"
},
{
"date": "2008-05-13T01:25:00",
"db": "BID",
"id": "25124"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2007-3387"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "25124"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "KDE KPDF/KWord/XPDF StreamPredictor Function Stack Buffer Overflow Vulnerability",
"sources": [
{
"db": "BID",
"id": "25124"
}
],
"trust": 0.3
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "overflow, arbitrary",
"sources": [
{
"db": "PACKETSTORM",
"id": "58350"
},
{
"db": "PACKETSTORM",
"id": "58547"
},
{
"db": "PACKETSTORM",
"id": "58338"
},
{
"db": "PACKETSTORM",
"id": "58551"
}
],
"trust": 0.4
}
}
OPENSUSE-SU-2024:10707-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cups-2.3.3op2-4.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the cups-2.3.3op2-4.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10707",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10707-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2005-3193 page",
"url": "https://www.suse.com/security/cve/CVE-2005-3193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2005-3624 page",
"url": "https://www.suse.com/security/cve/CVE-2005-3624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2005-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2005-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-0104 page",
"url": "https://www.suse.com/security/cve/CVE-2007-0104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-3387 page",
"url": "https://www.suse.com/security/cve/CVE-2007-3387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-4351 page",
"url": "https://www.suse.com/security/cve/CVE-2007-4351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-4352 page",
"url": "https://www.suse.com/security/cve/CVE-2007-4352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-5393 page",
"url": "https://www.suse.com/security/cve/CVE-2007-5393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-0047 page",
"url": "https://www.suse.com/security/cve/CVE-2008-0047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1693 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1722 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-3641 page",
"url": "https://www.suse.com/security/cve/CVE-2008-3641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18248 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18248/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-4700 page",
"url": "https://www.suse.com/security/cve/CVE-2018-4700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2228 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8696 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10001 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3898 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-25317 page",
"url": "https://www.suse.com/security/cve/CVE-2021-25317/"
}
],
"title": "cups-2.3.3op2-4.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10707-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cups-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-2.3.3op2-4.2.aarch64",
"product_id": "cups-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "cups-client-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-client-2.3.3op2-4.2.aarch64",
"product_id": "cups-client-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "cups-config-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-config-2.3.3op2-4.2.aarch64",
"product_id": "cups-config-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "cups-ddk-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-ddk-2.3.3op2-4.2.aarch64",
"product_id": "cups-ddk-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "cups-devel-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-devel-2.3.3op2-4.2.aarch64",
"product_id": "cups-devel-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "cups-devel-32bit-2.3.3op2-4.2.aarch64",
"product": {
"name": "cups-devel-32bit-2.3.3op2-4.2.aarch64",
"product_id": "cups-devel-32bit-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcups2-2.3.3op2-4.2.aarch64",
"product": {
"name": "libcups2-2.3.3op2-4.2.aarch64",
"product_id": "libcups2-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcups2-32bit-2.3.3op2-4.2.aarch64",
"product": {
"name": "libcups2-32bit-2.3.3op2-4.2.aarch64",
"product_id": "libcups2-32bit-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcupsimage2-2.3.3op2-4.2.aarch64",
"product": {
"name": "libcupsimage2-2.3.3op2-4.2.aarch64",
"product_id": "libcupsimage2-2.3.3op2-4.2.aarch64"
}
},
{
"category": "product_version",
"name": "libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"product": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"product_id": "libcupsimage2-32bit-2.3.3op2-4.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-2.3.3op2-4.2.ppc64le",
"product_id": "cups-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-client-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-client-2.3.3op2-4.2.ppc64le",
"product_id": "cups-client-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-config-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-config-2.3.3op2-4.2.ppc64le",
"product_id": "cups-config-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-ddk-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-ddk-2.3.3op2-4.2.ppc64le",
"product_id": "cups-ddk-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-devel-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-devel-2.3.3op2-4.2.ppc64le",
"product_id": "cups-devel-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"product": {
"name": "cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"product_id": "cups-devel-32bit-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcups2-2.3.3op2-4.2.ppc64le",
"product": {
"name": "libcups2-2.3.3op2-4.2.ppc64le",
"product_id": "libcups2-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcups2-32bit-2.3.3op2-4.2.ppc64le",
"product": {
"name": "libcups2-32bit-2.3.3op2-4.2.ppc64le",
"product_id": "libcups2-32bit-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcupsimage2-2.3.3op2-4.2.ppc64le",
"product": {
"name": "libcupsimage2-2.3.3op2-4.2.ppc64le",
"product_id": "libcupsimage2-2.3.3op2-4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"product": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"product_id": "libcupsimage2-32bit-2.3.3op2-4.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-2.3.3op2-4.2.s390x",
"product_id": "cups-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "cups-client-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-client-2.3.3op2-4.2.s390x",
"product_id": "cups-client-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "cups-config-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-config-2.3.3op2-4.2.s390x",
"product_id": "cups-config-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "cups-ddk-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-ddk-2.3.3op2-4.2.s390x",
"product_id": "cups-ddk-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "cups-devel-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-devel-2.3.3op2-4.2.s390x",
"product_id": "cups-devel-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "cups-devel-32bit-2.3.3op2-4.2.s390x",
"product": {
"name": "cups-devel-32bit-2.3.3op2-4.2.s390x",
"product_id": "cups-devel-32bit-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "libcups2-2.3.3op2-4.2.s390x",
"product": {
"name": "libcups2-2.3.3op2-4.2.s390x",
"product_id": "libcups2-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "libcups2-32bit-2.3.3op2-4.2.s390x",
"product": {
"name": "libcups2-32bit-2.3.3op2-4.2.s390x",
"product_id": "libcups2-32bit-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "libcupsimage2-2.3.3op2-4.2.s390x",
"product": {
"name": "libcupsimage2-2.3.3op2-4.2.s390x",
"product_id": "libcupsimage2-2.3.3op2-4.2.s390x"
}
},
{
"category": "product_version",
"name": "libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"product": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"product_id": "libcupsimage2-32bit-2.3.3op2-4.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-2.3.3op2-4.2.x86_64",
"product_id": "cups-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "cups-client-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-client-2.3.3op2-4.2.x86_64",
"product_id": "cups-client-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "cups-config-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-config-2.3.3op2-4.2.x86_64",
"product_id": "cups-config-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "cups-ddk-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-ddk-2.3.3op2-4.2.x86_64",
"product_id": "cups-ddk-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "cups-devel-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-devel-2.3.3op2-4.2.x86_64",
"product_id": "cups-devel-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "cups-devel-32bit-2.3.3op2-4.2.x86_64",
"product": {
"name": "cups-devel-32bit-2.3.3op2-4.2.x86_64",
"product_id": "cups-devel-32bit-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcups2-2.3.3op2-4.2.x86_64",
"product": {
"name": "libcups2-2.3.3op2-4.2.x86_64",
"product_id": "libcups2-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcups2-32bit-2.3.3op2-4.2.x86_64",
"product": {
"name": "libcups2-32bit-2.3.3op2-4.2.x86_64",
"product_id": "libcups2-32bit-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcupsimage2-2.3.3op2-4.2.x86_64",
"product": {
"name": "libcupsimage2-2.3.3op2-4.2.x86_64",
"product_id": "libcupsimage2-2.3.3op2-4.2.x86_64"
}
},
{
"category": "product_version",
"name": "libcupsimage2-32bit-2.3.3op2-4.2.x86_64",
"product": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.x86_64",
"product_id": "libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-client-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-client-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-client-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-client-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-client-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-client-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-client-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-client-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-config-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-config-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-config-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-config-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-config-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-config-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-config-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-config-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-ddk-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-ddk-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-ddk-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-ddk-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-ddk-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-ddk-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-ddk-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-ddk-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-devel-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-devel-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-devel-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-devel-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-32bit-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64"
},
"product_reference": "cups-devel-32bit-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-32bit-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le"
},
"product_reference": "cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-32bit-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x"
},
"product_reference": "cups-devel-32bit-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-32bit-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64"
},
"product_reference": "cups-devel-32bit-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64"
},
"product_reference": "libcups2-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le"
},
"product_reference": "libcups2-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x"
},
"product_reference": "libcups2-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64"
},
"product_reference": "libcups2-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-32bit-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64"
},
"product_reference": "libcups2-32bit-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-32bit-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le"
},
"product_reference": "libcups2-32bit-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-32bit-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x"
},
"product_reference": "libcups2-32bit-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcups2-32bit-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64"
},
"product_reference": "libcups2-32bit-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64"
},
"product_reference": "libcupsimage2-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le"
},
"product_reference": "libcupsimage2-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x"
},
"product_reference": "libcupsimage2-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64"
},
"product_reference": "libcupsimage2-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64"
},
"product_reference": "libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le"
},
"product_reference": "libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x"
},
"product_reference": "libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcupsimage2-32bit-2.3.3op2-4.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
},
"product_reference": "libcupsimage2-32bit-2.3.3op2-4.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-3193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2005-3193"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2005-3193",
"url": "https://www.suse.com/security/cve/CVE-2005-3193"
},
{
"category": "external",
"summary": "SUSE Bug 137156 for CVE-2005-3193",
"url": "https://bugzilla.suse.com/137156"
},
{
"category": "external",
"summary": "SUSE Bug 142106 for CVE-2005-3193",
"url": "https://bugzilla.suse.com/142106"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2005-3193"
},
{
"cve": "CVE-2005-3624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2005-3624"
}
],
"notes": [
{
"category": "general",
"text": "The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2005-3624",
"url": "https://www.suse.com/security/cve/CVE-2005-3624"
},
{
"category": "external",
"summary": "SUSE Bug 137156 for CVE-2005-3624",
"url": "https://bugzilla.suse.com/137156"
},
{
"category": "external",
"summary": "SUSE Bug 142106 for CVE-2005-3624",
"url": "https://bugzilla.suse.com/142106"
},
{
"category": "external",
"summary": "SUSE Bug 291690 for CVE-2005-3624",
"url": "https://bugzilla.suse.com/291690"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2005-3624"
},
{
"cve": "CVE-2005-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2005-3628"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2005-3628",
"url": "https://www.suse.com/security/cve/CVE-2005-3628"
},
{
"category": "external",
"summary": "SUSE Bug 137156 for CVE-2005-3628",
"url": "https://bugzilla.suse.com/137156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2005-3628"
},
{
"cve": "CVE-2007-0104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-0104"
}
],
"notes": [
{
"category": "general",
"text": "The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-0104",
"url": "https://www.suse.com/security/cve/CVE-2007-0104"
},
{
"category": "external",
"summary": "SUSE Bug 233113 for CVE-2007-0104",
"url": "https://bugzilla.suse.com/233113"
},
{
"category": "external",
"summary": "SUSE Bug 234492 for CVE-2007-0104",
"url": "https://bugzilla.suse.com/234492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-0104"
},
{
"cve": "CVE-2007-3387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-3387"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-3387",
"url": "https://www.suse.com/security/cve/CVE-2007-3387"
},
{
"category": "external",
"summary": "SUSE Bug 291690 for CVE-2007-3387",
"url": "https://bugzilla.suse.com/291690"
},
{
"category": "external",
"summary": "SUSE Bug 335637 for CVE-2007-3387",
"url": "https://bugzilla.suse.com/335637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-3387"
},
{
"cve": "CVE-2007-4351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-4351"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-4351",
"url": "https://www.suse.com/security/cve/CVE-2007-4351"
},
{
"category": "external",
"summary": "SUSE Bug 335635 for CVE-2007-4351",
"url": "https://bugzilla.suse.com/335635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2007-4351"
},
{
"cve": "CVE-2007-4352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-4352"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-4352",
"url": "https://www.suse.com/security/cve/CVE-2007-4352"
},
{
"category": "external",
"summary": "SUSE Bug 335637 for CVE-2007-4352",
"url": "https://bugzilla.suse.com/335637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2007-4352"
},
{
"cve": "CVE-2007-5393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-5393"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-5393",
"url": "https://www.suse.com/security/cve/CVE-2007-5393"
},
{
"category": "external",
"summary": "SUSE Bug 335637 for CVE-2007-5393",
"url": "https://bugzilla.suse.com/335637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2007-5393"
},
{
"cve": "CVE-2008-0047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-0047"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-0047",
"url": "https://www.suse.com/security/cve/CVE-2008-0047"
},
{
"category": "external",
"summary": "SUSE Bug 367225 for CVE-2008-0047",
"url": "https://bugzilla.suse.com/367225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-0047"
},
{
"cve": "CVE-2008-1693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1693"
}
],
"notes": [
{
"category": "general",
"text": "The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1693",
"url": "https://www.suse.com/security/cve/CVE-2008-1693"
},
{
"category": "external",
"summary": "SUSE Bug 377838 for CVE-2008-1693",
"url": "https://bugzilla.suse.com/377838"
},
{
"category": "external",
"summary": "SUSE Bug 377872 for CVE-2008-1693",
"url": "https://bugzilla.suse.com/377872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-1693"
},
{
"cve": "CVE-2008-1722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1722"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1722",
"url": "https://www.suse.com/security/cve/CVE-2008-1722"
},
{
"category": "external",
"summary": "SUSE Bug 378335 for CVE-2008-1722",
"url": "https://bugzilla.suse.com/378335"
},
{
"category": "external",
"summary": "SUSE Bug 448631 for CVE-2008-1722",
"url": "https://bugzilla.suse.com/448631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-1722"
},
{
"cve": "CVE-2008-3641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-3641"
}
],
"notes": [
{
"category": "general",
"text": "The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-3641",
"url": "https://www.suse.com/security/cve/CVE-2008-3641"
},
{
"category": "external",
"summary": "SUSE Bug 430543 for CVE-2008-3641",
"url": "https://bugzilla.suse.com/430543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-3641"
},
{
"cve": "CVE-2017-18248",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18248"
}
],
"notes": [
{
"category": "general",
"text": "The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18248",
"url": "https://www.suse.com/security/cve/CVE-2017-18248"
},
{
"category": "external",
"summary": "SUSE Bug 1087018 for CVE-2017-18248",
"url": "https://bugzilla.suse.com/1087018"
},
{
"category": "external",
"summary": "SUSE Bug 1087072 for CVE-2017-18248",
"url": "https://bugzilla.suse.com/1087072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-18248"
},
{
"cve": "CVE-2018-4700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-4700"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-4300. Reason: This candidate is a duplicate of CVE-2018-4300. Notes: All CVE users should reference CVE-2018-4300 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-4700",
"url": "https://www.suse.com/security/cve/CVE-2018-4700"
},
{
"category": "external",
"summary": "SUSE Bug 1115750 for CVE-2018-4700",
"url": "https://bugzilla.suse.com/1115750"
},
{
"category": "external",
"summary": "SUSE Bug 1131480 for CVE-2018-4700",
"url": "https://bugzilla.suse.com/1131480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-4700"
},
{
"cve": "CVE-2019-2228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2228"
}
],
"notes": [
{
"category": "general",
"text": "In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2228",
"url": "https://www.suse.com/security/cve/CVE-2019-2228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2228"
},
{
"cve": "CVE-2019-8696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8696"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8696",
"url": "https://www.suse.com/security/cve/CVE-2019-8696"
},
{
"category": "external",
"summary": "SUSE Bug 1146358 for CVE-2019-8696",
"url": "https://bugzilla.suse.com/1146358"
},
{
"category": "external",
"summary": "SUSE Bug 1146359 for CVE-2019-8696",
"url": "https://bugzilla.suse.com/1146359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8696"
},
{
"cve": "CVE-2019-8842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8842"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8842",
"url": "https://www.suse.com/security/cve/CVE-2019-8842"
},
{
"category": "external",
"summary": "SUSE Bug 1170671 for CVE-2019-8842",
"url": "https://bugzilla.suse.com/1170671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-8842"
},
{
"cve": "CVE-2020-10001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10001"
}
],
"notes": [
{
"category": "general",
"text": "An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10001",
"url": "https://www.suse.com/security/cve/CVE-2020-10001"
},
{
"category": "external",
"summary": "SUSE Bug 1170671 for CVE-2020-10001",
"url": "https://bugzilla.suse.com/1170671"
},
{
"category": "external",
"summary": "SUSE Bug 1180520 for CVE-2020-10001",
"url": "https://bugzilla.suse.com/1180520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10001"
},
{
"cve": "CVE-2020-3898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3898"
}
],
"notes": [
{
"category": "general",
"text": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3898",
"url": "https://www.suse.com/security/cve/CVE-2020-3898"
},
{
"category": "external",
"summary": "SUSE Bug 1168422 for CVE-2020-3898",
"url": "https://bugzilla.suse.com/1168422"
},
{
"category": "external",
"summary": "SUSE Bug 1170671 for CVE-2020-3898",
"url": "https://bugzilla.suse.com/1170671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-3898"
},
{
"cve": "CVE-2021-25317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-25317"
}
],
"notes": [
{
"category": "general",
"text": "A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-25317",
"url": "https://www.suse.com/security/cve/CVE-2021-25317"
},
{
"category": "external",
"summary": "SUSE Bug 1184161 for CVE-2021-25317",
"url": "https://bugzilla.suse.com/1184161"
},
{
"category": "external",
"summary": "SUSE Bug 1192358 for CVE-2021-25317",
"url": "https://bugzilla.suse.com/1192358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-client-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-config-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-ddk-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:cups-devel-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcups2-32bit-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-2.3.3op2-4.2.x86_64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.aarch64",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.ppc64le",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.s390x",
"openSUSE Tumbleweed:libcupsimage2-32bit-2.3.3op2-4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-25317"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.