Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0997 (GCVE-0-2011-0997)
Vulnerability from cvelistv5 – Published: 2011-04-08 15:00 – Updated: 2024-08-06 22:14- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:27.265Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "47176",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47176"
},
{
"name": "ADV-2011-0886",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"name": "44103",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44103"
},
{
"name": "RHSA-2011:0840",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"name": "44037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44037"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"name": "ADV-2011-0926",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"name": "HPSBMU02752",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "44127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44127"
},
{
"name": "MDVSA-2011:073",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"name": "SSRT100802",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "ADV-2011-0909",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"name": "oval:org.mitre.oval:def:12812",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"name": "71493",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/71493"
},
{
"name": "44090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44090"
},
{
"name": "44048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44048"
},
{
"name": "FEDORA-2011-4934",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"name": "iscdhcp-dhclient-command-execution(66580)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"name": "ADV-2011-0879",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"name": "VU#107886",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"name": "1025300",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1025300"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"name": "SSA:2011-097-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"name": "ADV-2011-1000",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"name": "ADV-2011-0915",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"name": "ADV-2011-0965",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"name": "37623",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"name": "GLSA-201301-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "44180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44180"
},
{
"name": "DSA-2217",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"name": "USN-1108-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"name": "DSA-2216",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"name": "FEDORA-2011-4897",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"name": "RHSA-2011:0428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"name": "44089",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44089"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-04-05T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "47176",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47176"
},
{
"name": "ADV-2011-0886",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"name": "44103",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44103"
},
{
"name": "RHSA-2011:0840",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"name": "44037",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44037"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"name": "ADV-2011-0926",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"name": "HPSBMU02752",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "44127",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44127"
},
{
"name": "MDVSA-2011:073",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"name": "SSRT100802",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "ADV-2011-0909",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"name": "oval:org.mitre.oval:def:12812",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"name": "71493",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/71493"
},
{
"name": "44090",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44090"
},
{
"name": "44048",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44048"
},
{
"name": "FEDORA-2011-4934",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"name": "iscdhcp-dhclient-command-execution(66580)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"name": "ADV-2011-0879",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"name": "VU#107886",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"name": "1025300",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1025300"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"name": "SSA:2011-097-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"name": "ADV-2011-1000",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"name": "ADV-2011-0915",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"name": "ADV-2011-0965",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"name": "37623",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"name": "GLSA-201301-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "44180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44180"
},
{
"name": "DSA-2217",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"name": "USN-1108-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"name": "DSA-2216",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"name": "FEDORA-2011-4897",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"name": "RHSA-2011:0428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"name": "44089",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44089"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "47176",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47176"
},
{
"name": "ADV-2011-0886",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"name": "44103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44103"
},
{
"name": "RHSA-2011:0840",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"name": "44037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44037"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"name": "ADV-2011-0926",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"name": "HPSBMU02752",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "44127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44127"
},
{
"name": "MDVSA-2011:073",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"name": "SSRT100802",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "ADV-2011-0909",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"name": "oval:org.mitre.oval:def:12812",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"name": "71493",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71493"
},
{
"name": "44090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44090"
},
{
"name": "44048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44048"
},
{
"name": "FEDORA-2011-4934",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997",
"refsource": "CONFIRM",
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"name": "iscdhcp-dhclient-command-execution(66580)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"name": "ADV-2011-0879",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"name": "VU#107886",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"name": "1025300",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025300"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"name": "SSA:2011-097-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"name": "ADV-2011-1000",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"name": "ADV-2011-0915",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"name": "ADV-2011-0965",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"name": "37623",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "44180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44180"
},
{
"name": "DSA-2217",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"name": "USN-1108-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"name": "DSA-2216",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"name": "FEDORA-2011-4897",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"name": "RHSA-2011:0428",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"name": "44089",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44089"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-0997",
"datePublished": "2011-04-08T15:00:00.000Z",
"dateReserved": "2011-02-14T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:14:27.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2011-0997\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-04-08T15:17:27.387\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.\"},{\"lang\":\"es\",\"value\":\"dhclient en ISC DHCP 3.0.x hasta la versi\u00f3n 4.2.x en versiones anteriores a 4.2.1-P1, 3.1-ESV en versiones anteriores a 3.1-ESV-R1 y 4.1-ESV en versiones anteriores a 4.1-ESV-R2 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres shell en un nombre de anfitri\u00f3n obtenido de un mensaje DHCP, como es demostrado por un nombre de anfitri\u00f3n dado por dhclient-script.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648BBC1F-1792-443F-B625-67A05004EB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA086AC5-9ADF-4EF9-9534-B1C78CD7A56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E94449B-6FB0-4E4D-9D92-144A1C474761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"6824B249-D222-4F29-8C29-E92071F12621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7A3F32-C297-4331-9B8D-1CF8F3D32315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4959ABA-9F2E-4003-9566-DBE3177AE233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE2A3CA-EFB6-4547-BED8-CAC39156F10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE205EE-F708-4E4A-A861-EBF6D3C062F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8EBBF0-A61B-4FF0-B055-9BA2A21617A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3141202-993D-4E80-9EAD-ACA6C1343D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0768D1-37D3-4C17-A3A9-94EA237392AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F167B922-DD9E-4DD1-BB8F-B232711BACCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E23602E-FFA1-49E2-BF4C-BC5D074517B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA200FE-D261-4532-AC63-1208611AFE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46030C9F-C817-4ACA-A89D-8CCD4DE97B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3649A4-BA40-4D8A-AB7C-AE1584459DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ADC8A14-E847-4CC5-8FA5-522883DE324F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA0C26C-9B0A-4ACB-9BD7-413F94948545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC6FA47-1F41-465D-8EAD-8116643ADAEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"87CBA8DD-650D-4A67-924C-B108CEE74BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D71C1AA-E5F7-454B-9267-FE23E1C2AB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D521DF6-AED8-40FA-B183-D469100B8B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD90F626-AC37-491A-A59D-11307D73E27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F59B80F0-2FD5-461B-91C7-966BAFB5AB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D8DF2C-387B-4880-9832-15583272E151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD78CE26-475D-4D8B-8625-CAE850F6E876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9338F9AA-41F0-470E-BB49-C1A395376DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297233D-6C25-4A10-8F0A-79A8452ABAD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC6F4D8-DD42-49F6-994C-75EFA888FA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D5A562-AEB5-41D8-9137-65B3100B1F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD8F74D-3F4B-4E25-92C9-D20C63B4B77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7928AD6-4E2D-414D-A7E2-6DFB559CA1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9AE49C-C152-4D0D-AB08-938F54631909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7528512B-66EC-4B2C-9158-34199C4A5FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"106F8860-B068-4B68-8734-206BFD401C3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"240D0880-DC35-41A6-B4F2-F9B73DF4AF59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6643B661-0253-4036-88D7-AF70B610B627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD04E6D-B418-4BCB-A3A1-CDFDEC271497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA10784-1F4A-459B-8FFE-47E9993A63AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF53110-2163-4474-81AC-846E8D502EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FEE70E-514D-4481-A9AE-89FBF9E90AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B571E882-C976-4156-BE03-96E52EA7463C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A01E62-5C0B-4CB7-B1A3-A60269D901E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25667FF-3EDC-4238-ADF5-25EFA4D88EDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B954F84E-1046-4A9F-AF86-7E62FDE88C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60C4CBE-C104-4A12-B7DD-AFBB2C1C21AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4033956-E928-42F7-97E9-A2357CEACEE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27D0660-2F07-430B-A651-5D0B6AA763C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3120B566-2BB6-4A1F-9ED7-E099E2870919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"150D46FA-873E-4E4F-8192-BCA1076994D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"56113AB6-8295-4EB7-A003-79049FBB8B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"362DA97E-B940-4649-803F-26D8C1D16DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"950A6BA0-C348-4B89-8C18-F2AFA467649F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9088D042-F104-4F31-AEBB-75F5A0F03AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F159908A-00E7-4EC8-8342-28182F547C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DF07-9612-43C7-9771-B76487B4A9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6D8D55-DCD2-4E70-B3C6-76F2134DA336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0F06FC0-6477-4589-B9CB-24B1F893EF09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCA07EB-B0CB-40EE-B62E-DB4C408717B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5D37DF0F-F863-45AC-853A-3E04F9FEC7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44037\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44048\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44089\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44090\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44103\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44127\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44180\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201301-06.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025300\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2216\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2217\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/107886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.osvdb.org/71493\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0428.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0840.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/47176\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1108-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0879\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0909\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0915\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0926\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0965\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/1000\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=689832\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/37623/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.isc.org/software/dhcp/advisories/cve-2011-0997\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44048\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44089\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201301-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/107886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.osvdb.org/71493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0428.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0840.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/47176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1108-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0926\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/1000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=689832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/37623/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.isc.org/software/dhcp/advisories/cve-2011-0997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTA-2011-AVI-190
Vulnerability from certfr_avis - Published: 2011-04-06 - Updated: 2011-04-27
Une vulnérabilité dans le logiciel libre DHCP développé par l'Internet System Consortium permet à un attaquant d'exécuter du code arbitraire à distance.
Description
Le logiciel libre DHCP développé par l'Internet System Consortium ne verifie pas la présence de certains caractères dans les réponses DHCP avant de les transmettre à un script. Il est donc possible, selon le script et le système d'exploitation cible, d'exécuter des commandes avec une réponse DHCP spécialement conçue.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "DHCP versions 4.2.x ant\u00e9rieures \u00e0 4.2.1-P1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "DHCP versions 4.1.x ant\u00e9rieures \u00e0 4.1.ESV-R2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "ISC",
"scada": false
}
}
},
{
"description": "DHCP versions 3.1.x ant\u00e9rieures \u00e0 3.1.ESV-R1.",
"product": {
"name": "N/A",
"vendor": {
"name": "ISC",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLe logiciel libre DHCP d\u00e9velopp\u00e9 par l\u0027Internet System Consortium ne\nverifie pas la pr\u00e9sence de certains caract\u00e8res dans les r\u00e9ponses DHCP\navant de les transmettre \u00e0 un script. Il est donc possible, selon le\nscript et le syst\u00e8me d\u0027exploitation cible, d\u0027ex\u00e9cuter des commandes avec\nune r\u00e9ponse DHCP sp\u00e9cialement con\u00e7ue.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
}
],
"initial_release_date": "2011-04-06T00:00:00",
"last_revision_date": "2011-04-27T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 NetBSD NetBSD-SA2011-005 du 26 avril 2011 :",
"url": "http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-005.txt.asc"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-4897 du 06 avril 2011 :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Debian DSA-2216 et 2217 du 10 avril 2011 :",
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 05 avril 2011 :",
"url": "https://www.redhat.com/security/data/cve/CVE-2011-0997.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2011:073 du 11 avril 2011 :",
"url": "http://www.mandriva.com/fr/support/security/advisories?name=MDVSA-2011:073"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-1108-1 du 11 avril 2011 :",
"url": "http://www.ubuntu.com/usn/USN-1108-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Novell :",
"url": "http://support.novell.com/security/cve/CVE-2011-0997.html"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 Debian DSA-2216 et 2217 du 10 avril 2011 :",
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-4935 du 07 avril 2011 :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
}
],
"reference": "CERTA-2011-AVI-190",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-04-06T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 Red Hat et Novell.",
"revision_date": "2011-04-11T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 Debian, Fedora, Mandriva, NetBSD et Ubuntu.",
"revision_date": "2011-04-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans le logiciel libre DHCP d\u00e9velopp\u00e9 par l\u0027Internet\nSystem Consortium permet \u00e0 un attaquant d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le client DHCP ISC",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de l\u0027ISC CVE-2011-0997 du 05 avril 2011",
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
}
]
}
CERTFR-2016-AVI-344
Vulnerability from certfr_avis - Published: 2016-10-13 - Updated: 2016-10-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos OS avec J-Web activé versions antérieures à 12.1X44-D60, 12.1X46-D40, 12.1X47-D30, 12.3R11, 12.3X48-D20, 13.2X51-D39, 13.2X51-D40, 13.3R9, 14.1R6, 14.2R6, 15.1R3, 15.1X49-D20 et 16.1R1 | ||
| Juniper Networks | Junos OS | Junos OS avec IPv6 versions antérieures à 11.4R13, 12.1X44-D45, 12.1X46-D30, 12.1X47-D20, 12.3R9 et 13.3R5 | ||
| Juniper Networks | N/A | vMX versions antérieures à 14.1R8, 15.1F6 et 16.1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D60, 12.1X47-D45, 12.3R12, 12.3X48-D35, 13.2R9, 13.3R9, 14.1R7, 14.1X53-D40, 14.1X55-D35, 14.2R5, 15.1F4, 15.1R3, 15.1X49-D60, 15.1X53-D70, 16.1R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 12.1X44-D60, 12.1X46-D40, 12.1X47-D30, 12.3R11, 12.3X48-D20, 13.2X51-D39, 13.2X51-D40, 13.3R9, 14.1R6, 14.2R6, 15.1R3, 15.1X49-D20 et 16.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS avec IPv6 versions ant\u00e9rieures \u00e0 11.4R13, 12.1X44-D45, 12.1X46-D30, 12.1X47-D20, 12.3R9 et 13.3R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "vMX versions ant\u00e9rieures \u00e0 14.1R8, 15.1F6 et 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D60, 12.1X47-D45, 12.3R12, 12.3X48-D35, 13.2R9, 13.3R9, 14.1R7, 14.1X53-D40, 14.1X55-D35, 14.2R5, 15.1F4, 15.1R3, 15.1X49-D60, 15.1X53-D70, 16.1R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4926"
},
{
"name": "CVE-2013-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1741"
},
{
"name": "CVE-2013-5606",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5606"
},
{
"name": "CVE-2011-2749",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2749"
},
{
"name": "CVE-2013-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
},
{
"name": "CVE-2015-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3195"
},
{
"name": "CVE-2016-4925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4925"
},
{
"name": "CVE-2016-4931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4931"
},
{
"name": "CVE-2013-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1739"
},
{
"name": "CVE-2013-5605",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5605"
},
{
"name": "CVE-2016-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4921"
},
{
"name": "CVE-2013-5607",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5607"
},
{
"name": "CVE-2013-0791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0791"
},
{
"name": "CVE-2015-3194",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3194"
},
{
"name": "CVE-2016-4927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4927"
},
{
"name": "CVE-2014-1491",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1491"
},
{
"name": "CVE-2014-1492",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1492"
},
{
"name": "CVE-2016-4928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4928"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2016-4922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4922"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2011-2748",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2748"
},
{
"name": "CVE-2015-1794",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1794"
},
{
"name": "CVE-2015-5366",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5366"
},
{
"name": "CVE-2014-1490",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1490"
},
{
"name": "CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
},
{
"name": "CVE-2016-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4924"
},
{
"name": "CVE-2015-3193",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3193"
},
{
"name": "CVE-2015-5364",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5364"
},
{
"name": "CVE-2013-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2596"
},
{
"name": "CVE-2012-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3571"
},
{
"name": "CVE-2015-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3196"
},
{
"name": "CVE-2016-4929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4929"
},
{
"name": "CVE-2016-4930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4930"
},
{
"name": "CVE-2015-2151",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2151"
},
{
"name": "CVE-2014-1545",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1545"
},
{
"name": "CVE-2016-4923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4923"
}
],
"initial_release_date": "2016-10-13T00:00:00",
"last_revision_date": "2016-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-344",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10763 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10763\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10764 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10764\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10766 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10766\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10762 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10762\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10761 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10760 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10760\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10767 du 13 octobre 2016",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10767\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2011-AVI-638
Vulnerability from certfr_avis - Published: 2011-11-15 - Updated: 2011-11-15
Un défaut de configuration dans les produits cités plus haut pourrait permettre à une personne malveillante de prendre le contrôle total du système à distance.
Description
Les dispositifs Tanberg possèdent leur compte administrateur (root) activé par défaut, sans mot de passe, ce qui était initialement prévu pour des tâches de déboguage mais non nécessaire lors des opérations normales.
Certains dispositifs Cisco TelePresence ont été distribués avec une configuration non sécurisée. La vulnérabilité est due à un échec de restauration de la configuration par défaut après avoir fait des tests et configuré des options. Ces dispositifs pourraient avoir leur compte administrateur (root) activé et configuré avec un mot de passe connu.
Une personne malveillante pourrait prendre le contrôle total d'un de ces systèmes à distance.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco TelePresence System Integrator C Series avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ; | ||
| Cisco | N/A | Cisco TelePresence Quick Set avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ; | ||
| Cisco | N/A | Tandberg E, EX et C Series Endpoints avec les versions logicielles antérieures à TC4.0. | ||
| Cisco | N/A | Cisco TelePresence Ex C Series avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ; |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco TelePresence System Integrator C Series avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco TelePresence Quick Set avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Tandberg E, EX et C Series Endpoints avec les versions logicielles ant\u00e9rieures \u00e0 TC4.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco TelePresence Ex C Series avec les versions logicielles TC4.0, TC4.1 ou TC4.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes dispositifs Tanberg poss\u00e8dent leur compte administrateur (root)\nactiv\u00e9 par d\u00e9faut, sans mot de passe, ce qui \u00e9tait initialement pr\u00e9vu\npour des t\u00e2ches de d\u00e9boguage mais non n\u00e9cessaire lors des op\u00e9rations\nnormales.\n\nCertains dispositifs Cisco TelePresence ont \u00e9t\u00e9 distribu\u00e9s avec une\nconfiguration non s\u00e9curis\u00e9e. La vuln\u00e9rabilit\u00e9 est due \u00e0 un \u00e9chec de\nrestauration de la configuration par d\u00e9faut apr\u00e8s avoir fait des tests\net configur\u00e9 des options. Ces dispositifs pourraient avoir leur compte\nadministrateur (root) activ\u00e9 et configur\u00e9 avec un mot de passe connu.\n\nUne personne malveillante pourrait prendre le contr\u00f4le total d\u0027un de ces\nsyst\u00e8mes \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
},
{
"name": "CVE-2011-0354",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0354"
}
],
"initial_release_date": "2011-11-15T00:00:00",
"last_revision_date": "2011-11-15T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20111109-telepresence-c-ex-series du 09 novembre 2011 :",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20111109-telepresence-c-ex-series"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco 20110202 du 2 f\u00e9vrier 2011 :",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20110202-tandberg"
}
],
"reference": "CERTA-2011-AVI-638",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-11-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Un d\u00e9faut de configuration dans les produits cit\u00e9s plus haut pourrait\npermettre \u00e0 une personne malveillante de prendre le contr\u00f4le total du\nsyst\u00e8me \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans des produits Cisco TelePresence et Tandberg",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20110202-tandberg",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20111109-telepresence-c-ex-series",
"url": null
}
]
}
CERTA-2011-AVI-423
Vulnerability from certfr_avis - Published: 2011-08-01 - Updated: 2011-08-01
De multiples vulnérabilités affectant différents logiciels inclus dans VMware ESX Console OS (COS) ont été corrigées.
Description
Plusieurs logiciels vulnérables inclus dans VMware ESX Console OS ont été mis à jour par l'éditeur :
- DHCP est mis à jour pour corriger une vulnérabilité permettant à un utilisateur malveillant distant de provoquer un déni de service et d'exécuter du code arbitraire (CVE-2011-0997) ;
- glibc est mise à jour pour corriger de multiples vulnérabilités exploitables localement (CVE 2010-0296, CVE-2011-0536, CVE-2011-997 et CVE-2011-1071).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VMware fourni pour l'instant des correctifs pour la version 4.1 d'ESX. Les correctifs pour les versions 4.0 et 3.5 ont été annoncés.
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX 3.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 4.1.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 3.5.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX 4.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs logiciels vuln\u00e9rables inclus dans VMware ESX Console OS ont\n\u00e9t\u00e9 mis \u00e0 jour par l\u0027\u00e9diteur :\n\n- DHCP est mis \u00e0 jour pour corriger une vuln\u00e9rabilit\u00e9 permettant \u00e0 un\n utilisateur malveillant distant de provoquer un d\u00e9ni de service et\n d\u0027ex\u00e9cuter du code arbitraire (CVE-2011-0997) ;\n- glibc est mise \u00e0 jour pour corriger de multiples vuln\u00e9rabilit\u00e9s\n exploitables localement (CVE 2010-0296, CVE-2011-0536, CVE-2011-997\n et CVE-2011-1071).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\nVMware fourni pour l\u0027instant des correctifs pour la version 4.1 d\u0027ESX.\nLes correctifs pour les versions 4.0 et 3.5 ont \u00e9t\u00e9 annonc\u00e9s.\n",
"cves": [
{
"name": "CVE-2010-0296",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0296"
},
{
"name": "CVE-2011-0536",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0536"
},
{
"name": "CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
},
{
"name": "CVE-2011-1071",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1071"
},
{
"name": "CVE-2011-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1095"
}
],
"initial_release_date": "2011-08-01T00:00:00",
"last_revision_date": "2011-08-01T00:00:00",
"links": [
{
"title": "Avis CERTA CERTA-2011-AVI-193 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-193/"
},
{
"title": "Avis CERTA CERTA-2011-AVI-190 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-190/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2011-0010 du 28 juillet 2011 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2011-0010.html"
}
],
"reference": "CERTA-2011-AVI-423",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectant diff\u00e9rents logiciels inclus dans\nVMware ESX Console OS \u003cspan class=\"textit\"\u003e(COS)\u003c/span\u003e ont \u00e9t\u00e9\ncorrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX",
"vendor_advisories": [
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 VMware VMSA-2011-0010 du 28 juillet 2011",
"url": null
}
]
}
CERTA-2011-AVI-637
Vulnerability from certfr_avis - Published: 2011-11-14 - Updated: 2011-11-14
Une vulnérabilité dans Time Capsule et AirPort Base Station (802.11n) pourrait permettre à une personne malintentionnée d'exécuter du code arbitraire à distance.
Description
La vulnérabilité se trouve dans dhclient. Une personne malintentionnée pourrait envoyer des réponses DHCP malveillantes contenant des méta-caractères du shell dans le hostname et ainsi exécuter des commandes arbitraires à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Time Capsule.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "AirPort Extreme Base Station (802.11n) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "AirPort Express Base Station (802.11n) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa vuln\u00e9rabilit\u00e9 se trouve dans dhclient. Une personne malintentionn\u00e9e\npourrait envoyer des r\u00e9ponses DHCP malveillantes contenant des\nm\u00e9ta-caract\u00e8res du shell dans le hostname et ainsi ex\u00e9cuter des\ncommandes arbitraires \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
}
],
"initial_release_date": "2011-11-14T00:00:00",
"last_revision_date": "2011-11-14T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-637",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans \u003cspan class=\"textit\"\u003eTime Capsule\u003c/span\u003e et \u003cspan\nclass=\"textit\"\u003eAirPort Base Station\u003c/span\u003e (802.11n) pourrait permettre\n\u00e0 une personne malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Apple \u003cSPAN class=\"textit\"\u003eTime Capsule\u003c/SPAN\u003e et \u003cSPAN class=\"textit\"\u003eAirPort Base Station\u003c/SPAN\u003e",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT5005 du 11 novembre 2011",
"url": "http://support.apple.com/kb/HT5005"
}
]
}
RHSA-2011:0428
Vulnerability from csaf_redhat - Published: 2011-04-08 14:38 - Updated: 2026-01-13 22:12dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated dhcp packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows\nindividual devices on an IP network to get their own network configuration\ninformation, including an IP address, a subnet mask, and a broadcast\naddress.\n\nIt was discovered that the DHCP client daemon, dhclient, did not\nsufficiently sanitize certain options provided in DHCP server replies, such\nas the client hostname. A malicious DHCP server could send such an option\nwith a specially-crafted value to a DHCP client. If this option\u0027s value was\nsaved on the client system, and then later insecurely evaluated by a\nprocess that assumes the option is trusted, it could lead to arbitrary code\nexecution with the privileges of that process. (CVE-2011-0997)\n\nRed Hat would like to thank Sebastian Krahmer of the SuSE Security Team for\nreporting this issue.\n\nAll dhclient users should upgrade to these updated packages, which contain\na backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0428",
"url": "https://access.redhat.com/errata/RHSA-2011:0428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "689832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0428.json"
}
],
"title": "Red Hat Security Advisory: dhcp security update",
"tracking": {
"current_release_date": "2026-01-13T22:12:14+00:00",
"generator": {
"date": "2026-01-13T22:12:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0428",
"initial_release_date": "2011-04-08T14:38:00+00:00",
"revision_history": [
{
"date": "2011-04-08T14:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-04-08T10:39:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:12:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"product": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"product": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"product": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"product": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "dhclient-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "dhclient-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.x86_64",
"product": {
"name": "dhclient-7:3.0.1-67.el4.x86_64",
"product_id": "dhclient-7:3.0.1-67.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"product_id": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.x86_64",
"product": {
"name": "dhcp-7:3.0.1-67.el4.x86_64",
"product_id": "dhcp-7:3.0.1-67.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=x86_64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"product": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"product": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "dhclient-12:3.0.5-23.el5_6.4.ppc",
"product_id": "dhclient-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.ppc",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.ppc",
"product": {
"name": "dhclient-7:3.0.1-67.el4.ppc",
"product_id": "dhclient-7:3.0.1-67.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=ppc\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.ppc",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.ppc",
"product_id": "dhcp-devel-7:3.0.1-67.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=ppc\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=ppc\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.ppc",
"product": {
"name": "dhcp-7:3.0.1-67.el4.ppc",
"product_id": "dhcp-7:3.0.1-67.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=ppc\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"product": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"product": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "dhclient-12:3.0.5-23.el5_6.4.s390x",
"product_id": "dhclient-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.s390x",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.s390x",
"product": {
"name": "dhclient-7:3.0.1-67.el4.s390x",
"product_id": "dhclient-7:3.0.1-67.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.s390x",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390x",
"product_id": "dhcp-devel-7:3.0.1-67.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=s390x\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.s390x",
"product": {
"name": "dhcp-7:3.0.1-67.el4.s390x",
"product_id": "dhcp-7:3.0.1-67.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=s390x\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"product": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"product": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.s390",
"product": {
"name": "dhclient-7:3.0.1-67.el4.s390",
"product_id": "dhclient-7:3.0.1-67.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=s390\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.s390",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390",
"product_id": "dhcp-devel-7:3.0.1-67.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=s390\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=s390\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.s390",
"product": {
"name": "dhcp-7:3.0.1-67.el4.s390",
"product_id": "dhcp-7:3.0.1-67.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=s390\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"product": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=src\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.src",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.src",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=src\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.src",
"product": {
"name": "dhcp-7:3.0.1-67.el4.src",
"product_id": "dhcp-7:3.0.1-67.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "dhclient-12:3.0.5-23.el5_6.4.ia64",
"product_id": "dhclient-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.ia64",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.ia64",
"product": {
"name": "dhclient-7:3.0.1-67.el4.ia64",
"product_id": "dhclient-7:3.0.1-67.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=ia64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.ia64",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.ia64",
"product_id": "dhcp-devel-7:3.0.1-67.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=ia64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=ia64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.ia64",
"product": {
"name": "dhcp-7:3.0.1-67.el4.ia64",
"product_id": "dhcp-7:3.0.1-67.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=ia64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "dhclient-12:3.0.5-23.el5_6.4.i386",
"product_id": "dhclient-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhcp-12:3.0.5-23.el5_6.4.i386",
"product": {
"name": "dhcp-12:3.0.5-23.el5_6.4.i386",
"product_id": "dhcp-12:3.0.5-23.el5_6.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12"
}
}
},
{
"category": "product_version",
"name": "dhclient-7:3.0.1-67.el4.i386",
"product": {
"name": "dhclient-7:3.0.1-67.el4.i386",
"product_id": "dhclient-7:3.0.1-67.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-67.el4.i386",
"product": {
"name": "dhcp-devel-7:3.0.1-67.el4.i386",
"product_id": "dhcp-devel-7:3.0.1-67.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"product_id": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-67.el4.i386",
"product": {
"name": "dhcp-7:3.0.1-67.el4.i386",
"product_id": "dhcp-7:3.0.1-67.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=i386\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.i386"
},
"product_reference": "dhclient-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.s390"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhclient-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.src"
},
"product_reference": "dhcp-7:3.0.1-67.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.i386"
},
"product_reference": "dhclient-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.s390"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhclient-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.src"
},
"product_reference": "dhcp-7:3.0.1-67.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.i386"
},
"product_reference": "dhclient-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.s390"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhclient-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.src"
},
"product_reference": "dhcp-7:3.0.1-67.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.i386"
},
"product_reference": "dhclient-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhclient-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.s390"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhclient-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhclient-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhclient-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.src"
},
"product_reference": "dhcp-7:3.0.1-67.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.ia64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.ppc"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.s390"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.s390x"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.x86_64"
},
"product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "dhclient-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "dhclient-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "dhclient-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "dhclient-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "dhclient-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "dhcp-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64"
},
"product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
},
"product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Sebastian Krahmer"
],
"organization": "SuSE Security Team"
}
],
"cve": "CVE-2011-0997",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2011-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689832"
}
],
"notes": [
{
"category": "description",
"text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dhclient: insufficient sanitization of certain DHCP response values",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:dhclient-7:3.0.1-67.el4.i386",
"4AS:dhclient-7:3.0.1-67.el4.ia64",
"4AS:dhclient-7:3.0.1-67.el4.ppc",
"4AS:dhclient-7:3.0.1-67.el4.s390",
"4AS:dhclient-7:3.0.1-67.el4.s390x",
"4AS:dhclient-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-7:3.0.1-67.el4.i386",
"4AS:dhcp-7:3.0.1-67.el4.ia64",
"4AS:dhcp-7:3.0.1-67.el4.ppc",
"4AS:dhcp-7:3.0.1-67.el4.s390",
"4AS:dhcp-7:3.0.1-67.el4.s390x",
"4AS:dhcp-7:3.0.1-67.el4.src",
"4AS:dhcp-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-devel-7:3.0.1-67.el4.i386",
"4AS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4AS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4AS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4Desktop:dhclient-7:3.0.1-67.el4.i386",
"4Desktop:dhclient-7:3.0.1-67.el4.ia64",
"4Desktop:dhclient-7:3.0.1-67.el4.ppc",
"4Desktop:dhclient-7:3.0.1-67.el4.s390",
"4Desktop:dhclient-7:3.0.1-67.el4.s390x",
"4Desktop:dhclient-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-7:3.0.1-67.el4.src",
"4Desktop:dhcp-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4ES:dhclient-7:3.0.1-67.el4.i386",
"4ES:dhclient-7:3.0.1-67.el4.ia64",
"4ES:dhclient-7:3.0.1-67.el4.ppc",
"4ES:dhclient-7:3.0.1-67.el4.s390",
"4ES:dhclient-7:3.0.1-67.el4.s390x",
"4ES:dhclient-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-7:3.0.1-67.el4.i386",
"4ES:dhcp-7:3.0.1-67.el4.ia64",
"4ES:dhcp-7:3.0.1-67.el4.ppc",
"4ES:dhcp-7:3.0.1-67.el4.s390",
"4ES:dhcp-7:3.0.1-67.el4.s390x",
"4ES:dhcp-7:3.0.1-67.el4.src",
"4ES:dhcp-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-devel-7:3.0.1-67.el4.i386",
"4ES:dhcp-devel-7:3.0.1-67.el4.ia64",
"4ES:dhcp-devel-7:3.0.1-67.el4.ppc",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390x",
"4ES:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4WS:dhclient-7:3.0.1-67.el4.i386",
"4WS:dhclient-7:3.0.1-67.el4.ia64",
"4WS:dhclient-7:3.0.1-67.el4.ppc",
"4WS:dhclient-7:3.0.1-67.el4.s390",
"4WS:dhclient-7:3.0.1-67.el4.s390x",
"4WS:dhclient-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-7:3.0.1-67.el4.i386",
"4WS:dhcp-7:3.0.1-67.el4.ia64",
"4WS:dhcp-7:3.0.1-67.el4.ppc",
"4WS:dhcp-7:3.0.1-67.el4.s390",
"4WS:dhcp-7:3.0.1-67.el4.s390x",
"4WS:dhcp-7:3.0.1-67.el4.src",
"4WS:dhcp-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-devel-7:3.0.1-67.el4.i386",
"4WS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4WS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4WS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0997"
},
{
"category": "external",
"summary": "RHBZ#689832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-04-08T14:38:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:dhclient-7:3.0.1-67.el4.i386",
"4AS:dhclient-7:3.0.1-67.el4.ia64",
"4AS:dhclient-7:3.0.1-67.el4.ppc",
"4AS:dhclient-7:3.0.1-67.el4.s390",
"4AS:dhclient-7:3.0.1-67.el4.s390x",
"4AS:dhclient-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-7:3.0.1-67.el4.i386",
"4AS:dhcp-7:3.0.1-67.el4.ia64",
"4AS:dhcp-7:3.0.1-67.el4.ppc",
"4AS:dhcp-7:3.0.1-67.el4.s390",
"4AS:dhcp-7:3.0.1-67.el4.s390x",
"4AS:dhcp-7:3.0.1-67.el4.src",
"4AS:dhcp-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-devel-7:3.0.1-67.el4.i386",
"4AS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4AS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4AS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4Desktop:dhclient-7:3.0.1-67.el4.i386",
"4Desktop:dhclient-7:3.0.1-67.el4.ia64",
"4Desktop:dhclient-7:3.0.1-67.el4.ppc",
"4Desktop:dhclient-7:3.0.1-67.el4.s390",
"4Desktop:dhclient-7:3.0.1-67.el4.s390x",
"4Desktop:dhclient-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-7:3.0.1-67.el4.src",
"4Desktop:dhcp-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4ES:dhclient-7:3.0.1-67.el4.i386",
"4ES:dhclient-7:3.0.1-67.el4.ia64",
"4ES:dhclient-7:3.0.1-67.el4.ppc",
"4ES:dhclient-7:3.0.1-67.el4.s390",
"4ES:dhclient-7:3.0.1-67.el4.s390x",
"4ES:dhclient-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-7:3.0.1-67.el4.i386",
"4ES:dhcp-7:3.0.1-67.el4.ia64",
"4ES:dhcp-7:3.0.1-67.el4.ppc",
"4ES:dhcp-7:3.0.1-67.el4.s390",
"4ES:dhcp-7:3.0.1-67.el4.s390x",
"4ES:dhcp-7:3.0.1-67.el4.src",
"4ES:dhcp-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-devel-7:3.0.1-67.el4.i386",
"4ES:dhcp-devel-7:3.0.1-67.el4.ia64",
"4ES:dhcp-devel-7:3.0.1-67.el4.ppc",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390x",
"4ES:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4WS:dhclient-7:3.0.1-67.el4.i386",
"4WS:dhclient-7:3.0.1-67.el4.ia64",
"4WS:dhclient-7:3.0.1-67.el4.ppc",
"4WS:dhclient-7:3.0.1-67.el4.s390",
"4WS:dhclient-7:3.0.1-67.el4.s390x",
"4WS:dhclient-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-7:3.0.1-67.el4.i386",
"4WS:dhcp-7:3.0.1-67.el4.ia64",
"4WS:dhcp-7:3.0.1-67.el4.ppc",
"4WS:dhcp-7:3.0.1-67.el4.s390",
"4WS:dhcp-7:3.0.1-67.el4.s390x",
"4WS:dhcp-7:3.0.1-67.el4.src",
"4WS:dhcp-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-devel-7:3.0.1-67.el4.i386",
"4WS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4WS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4WS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0428"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS:dhclient-7:3.0.1-67.el4.i386",
"4AS:dhclient-7:3.0.1-67.el4.ia64",
"4AS:dhclient-7:3.0.1-67.el4.ppc",
"4AS:dhclient-7:3.0.1-67.el4.s390",
"4AS:dhclient-7:3.0.1-67.el4.s390x",
"4AS:dhclient-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-7:3.0.1-67.el4.i386",
"4AS:dhcp-7:3.0.1-67.el4.ia64",
"4AS:dhcp-7:3.0.1-67.el4.ppc",
"4AS:dhcp-7:3.0.1-67.el4.s390",
"4AS:dhcp-7:3.0.1-67.el4.s390x",
"4AS:dhcp-7:3.0.1-67.el4.src",
"4AS:dhcp-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4AS:dhcp-devel-7:3.0.1-67.el4.i386",
"4AS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4AS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390",
"4AS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4AS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4Desktop:dhclient-7:3.0.1-67.el4.i386",
"4Desktop:dhclient-7:3.0.1-67.el4.ia64",
"4Desktop:dhclient-7:3.0.1-67.el4.ppc",
"4Desktop:dhclient-7:3.0.1-67.el4.s390",
"4Desktop:dhclient-7:3.0.1-67.el4.s390x",
"4Desktop:dhclient-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-7:3.0.1-67.el4.src",
"4Desktop:dhcp-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.i386",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x",
"4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4ES:dhclient-7:3.0.1-67.el4.i386",
"4ES:dhclient-7:3.0.1-67.el4.ia64",
"4ES:dhclient-7:3.0.1-67.el4.ppc",
"4ES:dhclient-7:3.0.1-67.el4.s390",
"4ES:dhclient-7:3.0.1-67.el4.s390x",
"4ES:dhclient-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-7:3.0.1-67.el4.i386",
"4ES:dhcp-7:3.0.1-67.el4.ia64",
"4ES:dhcp-7:3.0.1-67.el4.ppc",
"4ES:dhcp-7:3.0.1-67.el4.s390",
"4ES:dhcp-7:3.0.1-67.el4.s390x",
"4ES:dhcp-7:3.0.1-67.el4.src",
"4ES:dhcp-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4ES:dhcp-devel-7:3.0.1-67.el4.i386",
"4ES:dhcp-devel-7:3.0.1-67.el4.ia64",
"4ES:dhcp-devel-7:3.0.1-67.el4.ppc",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390",
"4ES:dhcp-devel-7:3.0.1-67.el4.s390x",
"4ES:dhcp-devel-7:3.0.1-67.el4.x86_64",
"4WS:dhclient-7:3.0.1-67.el4.i386",
"4WS:dhclient-7:3.0.1-67.el4.ia64",
"4WS:dhclient-7:3.0.1-67.el4.ppc",
"4WS:dhclient-7:3.0.1-67.el4.s390",
"4WS:dhclient-7:3.0.1-67.el4.s390x",
"4WS:dhclient-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-7:3.0.1-67.el4.i386",
"4WS:dhcp-7:3.0.1-67.el4.ia64",
"4WS:dhcp-7:3.0.1-67.el4.ppc",
"4WS:dhcp-7:3.0.1-67.el4.s390",
"4WS:dhcp-7:3.0.1-67.el4.s390x",
"4WS:dhcp-7:3.0.1-67.el4.src",
"4WS:dhcp-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x",
"4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64",
"4WS:dhcp-devel-7:3.0.1-67.el4.i386",
"4WS:dhcp-devel-7:3.0.1-67.el4.ia64",
"4WS:dhcp-devel-7:3.0.1-67.el4.ppc",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390",
"4WS:dhcp-devel-7:3.0.1-67.el4.s390x",
"4WS:dhcp-devel-7:3.0.1-67.el4.x86_64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src",
"5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x",
"5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src",
"6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x",
"6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dhclient: insufficient sanitization of certain DHCP response values"
}
]
}
RHSA-2011:0840
Vulnerability from csaf_redhat - Published: 2011-05-31 14:48 - Updated: 2026-01-13 22:31dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated dhcp packages that fix one security issue are now available for\nRed Hat Enterprise Linux 3 Extended Life Cycle Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows\nindividual devices on an IP network to get their own network configuration\ninformation, including an IP address, a subnet mask, and a broadcast\naddress.\n\nIt was discovered that the DHCP client daemon, dhclient, did not\nsufficiently sanitize certain options provided in DHCP server replies, such\nas the client hostname. A malicious DHCP server could send such an option\nwith a specially-crafted value to a DHCP client. If this option\u0027s value was\nsaved on the client system, and then later insecurely evaluated by a\nprocess that assumes the option is trusted, it could lead to arbitrary code\nexecution with the privileges of that process. (CVE-2011-0997)\n\nRed Hat would like to thank Sebastian Krahmer of the SuSE Security Team for\nreporting this issue.\n\nAll dhclient users should upgrade to these updated packages, which contain\na backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0840",
"url": "https://access.redhat.com/errata/RHSA-2011:0840"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "689832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0840.json"
}
],
"title": "Red Hat Security Advisory: dhcp security update",
"tracking": {
"current_release_date": "2026-01-13T22:31:34+00:00",
"generator": {
"date": "2026-01-13T22:31:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHSA-2011:0840",
"initial_release_date": "2011-05-31T14:48:00+00:00",
"revision_history": [
{
"date": "2011-05-31T14:48:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-05-31T10:52:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T22:31:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product": {
"name": "Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:3::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "dhclient-7:3.0.1-10.3_EL3.i386",
"product": {
"name": "dhclient-7:3.0.1-10.3_EL3.i386",
"product_id": "dhclient-7:3.0.1-10.3_EL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhclient@3.0.1-10.3_EL3?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-7:3.0.1-10.3_EL3.i386",
"product": {
"name": "dhcp-7:3.0.1-10.3_EL3.i386",
"product_id": "dhcp-7:3.0.1-10.3_EL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-10.3_EL3?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"product": {
"name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"product_id": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-10.3_EL3?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "dhcp-devel-7:3.0.1-10.3_EL3.i386",
"product": {
"name": "dhcp-devel-7:3.0.1-10.3_EL3.i386",
"product_id": "dhcp-devel-7:3.0.1-10.3_EL3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-10.3_EL3?arch=i386\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-7:3.0.1-10.3_EL3.src",
"product": {
"name": "dhcp-7:3.0.1-10.3_EL3.src",
"product_id": "dhcp-7:3.0.1-10.3_EL3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/dhcp@3.0.1-10.3_EL3?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhclient-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-10.3_EL3.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src"
},
"product_reference": "dhcp-7:3.0.1-10.3_EL3.src",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)",
"product_id": "3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhclient-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhclient-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-7:3.0.1-10.3_EL3.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src"
},
"product_reference": "dhcp-7:3.0.1-10.3_EL3.src",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)",
"product_id": "3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386"
},
"product_reference": "dhcp-devel-7:3.0.1-10.3_EL3.i386",
"relates_to_product_reference": "3ES-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Sebastian Krahmer"
],
"organization": "SuSE Security Team"
}
],
"cve": "CVE-2011-0997",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2011-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "689832"
}
],
"notes": [
{
"category": "description",
"text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dhclient: insufficient sanitization of certain DHCP response values",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0997"
},
{
"category": "external",
"summary": "RHBZ#689832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0997"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997"
}
],
"release_date": "2011-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T14:48:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0840"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src",
"3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386",
"3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dhclient: insufficient sanitization of certain DHCP response values"
}
]
}
FKIE_CVE-2011-0997
Vulnerability from fkie_nvd - Published: 2011-04-08 15:17 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 | Third Party Advisory | |
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=133226187115472&w=2 | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44037 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44048 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44089 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44090 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44103 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44127 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/44180 | Third Party Advisory | |
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201301-06.xml | Third Party Advisory | |
| cve@mitre.org | http://securitytracker.com/id?1025300 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345 | Third Party Advisory | |
| cve@mitre.org | http://www.debian.org/security/2011/dsa-2216 | Third Party Advisory | |
| cve@mitre.org | http://www.debian.org/security/2011/dsa-2217 | Third Party Advisory | |
| cve@mitre.org | http://www.kb.cert.org/vuls/id/107886 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2011:073 | Third Party Advisory | |
| cve@mitre.org | http://www.osvdb.org/71493 | Broken Link | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0428.html | Third Party Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0840.html | Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/47176 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.ubuntu.com/usn/USN-1108-1 | Third Party Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0879 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0886 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0909 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0915 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0926 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0965 | Permissions Required | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/1000 | Permissions Required | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=689832 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/66580 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812 | Third Party Advisory | |
| cve@mitre.org | https://www.exploit-db.com/exploits/37623/ | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.isc.org/software/dhcp/advisories/cve-2011-0997 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133226187115472&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44037 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44048 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44089 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44090 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44103 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44127 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44180 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201301-06.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1025300 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593345 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2216 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2217 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/107886 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:073 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/71493 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0428.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0840.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/47176 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1108-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0879 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0886 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0909 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0915 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0926 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0965 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/1000 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=689832 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/66580 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/37623/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.isc.org/software/dhcp/advisories/cve-2011-0997 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| isc | dhcp | 3.0 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.1 | |
| isc | dhcp | 3.0.2 | |
| isc | dhcp | 3.0.2 | |
| isc | dhcp | 3.0.2 | |
| isc | dhcp | 3.0.2 | |
| isc | dhcp | 3.0.2 | |
| isc | dhcp | 3.0.3 | |
| isc | dhcp | 3.0.3 | |
| isc | dhcp | 3.0.3 | |
| isc | dhcp | 3.0.3 | |
| isc | dhcp | 3.0.4 | |
| isc | dhcp | 3.0.4 | |
| isc | dhcp | 3.0.4 | |
| isc | dhcp | 3.0.4 | |
| isc | dhcp | 3.0.4 | |
| isc | dhcp | 3.0.5 | |
| isc | dhcp | 3.0.5 | |
| isc | dhcp | 3.0.6 | |
| isc | dhcp | 3.1-esv | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.0 | |
| isc | dhcp | 3.1.1 | |
| isc | dhcp | 3.1.1 | |
| isc | dhcp | 3.1.2 | |
| isc | dhcp | 3.1.2 | |
| isc | dhcp | 3.1.2 | |
| isc | dhcp | 3.1.3 | |
| isc | dhcp | 3.1.3 | |
| isc | dhcp | 3.1.3 | |
| isc | dhcp | 4.1-esv | |
| isc | dhcp | 4.1-esv | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.0 | |
| isc | dhcp | 4.2.1 | |
| isc | dhcp | 4.2.1 | |
| isc | dhcp | 4.2.1 | |
| debian | debian_linux | 5.0 | |
| debian | debian_linux | 6.0 | |
| debian | debian_linux | 7.0 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 9.10 | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 10.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "648BBC1F-1792-443F-B625-67A05004EB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "EA086AC5-9ADF-4EF9-9534-B1C78CD7A56C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1E94449B-6FB0-4E4D-9D92-144A1C474761",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*",
"matchCriteriaId": "6824B249-D222-4F29-8C29-E92071F12621",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*",
"matchCriteriaId": "2F7A3F32-C297-4331-9B8D-1CF8F3D32315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*",
"matchCriteriaId": "B4959ABA-9F2E-4003-9566-DBE3177AE233",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*",
"matchCriteriaId": "0CE2A3CA-EFB6-4547-BED8-CAC39156F10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*",
"matchCriteriaId": "5DE205EE-F708-4E4A-A861-EBF6D3C062F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BD8EBBF0-A61B-4FF0-B055-9BA2A21617A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B3141202-993D-4E80-9EAD-ACA6C1343D6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6E0768D1-37D3-4C17-A3A9-94EA237392AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "F167B922-DD9E-4DD1-BB8F-B232711BACCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*",
"matchCriteriaId": "4E23602E-FFA1-49E2-BF4C-BC5D074517B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*",
"matchCriteriaId": "8DA200FE-D261-4532-AC63-1208611AFE46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "46030C9F-C817-4ACA-A89D-8CCD4DE97B3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "0A3649A4-BA40-4D8A-AB7C-AE1584459DFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9ADC8A14-E847-4CC5-8FA5-522883DE324F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CAA0C26C-9B0A-4ACB-9BD7-413F94948545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2DC6FA47-1F41-465D-8EAD-8116643ADAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*",
"matchCriteriaId": "87CBA8DD-650D-4A67-924C-B108CEE74BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "5D71C1AA-E5F7-454B-9267-FE23E1C2AB31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*",
"matchCriteriaId": "6D521DF6-AED8-40FA-B183-D469100B8B7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*",
"matchCriteriaId": "BD90F626-AC37-491A-A59D-11307D73E27A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*",
"matchCriteriaId": "F59B80F0-2FD5-461B-91C7-966BAFB5AB38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*",
"matchCriteriaId": "34D8DF2C-387B-4880-9832-15583272E151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*",
"matchCriteriaId": "FD78CE26-475D-4D8B-8625-CAE850F6E876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*",
"matchCriteriaId": "9338F9AA-41F0-470E-BB49-C1A395376DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6297233D-6C25-4A10-8F0A-79A8452ABAD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*",
"matchCriteriaId": "0AC6F4D8-DD42-49F6-994C-75EFA888FA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B9D5A562-AEB5-41D8-9137-65B3100B1F21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5AD8F74D-3F4B-4E25-92C9-D20C63B4B77E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*",
"matchCriteriaId": "B7928AD6-4E2D-414D-A7E2-6DFB559CA1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CD9AE49C-C152-4D0D-AB08-938F54631909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "7528512B-66EC-4B2C-9158-34199C4A5FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "106F8860-B068-4B68-8734-206BFD401C3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*",
"matchCriteriaId": "240D0880-DC35-41A6-B4F2-F9B73DF4AF59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "6643B661-0253-4036-88D7-AF70B610B627",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "EFD04E6D-B418-4BCB-A3A1-CDFDEC271497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7CA10784-1F4A-459B-8FFE-47E9993A63AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1CF53110-2163-4474-81AC-846E8D502EB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "60FEE70E-514D-4481-A9AE-89FBF9E90AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "B571E882-C976-4156-BE03-96E52EA7463C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*",
"matchCriteriaId": "F7A01E62-5C0B-4CB7-B1A3-A60269D901E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D25667FF-3EDC-4238-ADF5-25EFA4D88EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*",
"matchCriteriaId": "B954F84E-1046-4A9F-AF86-7E62FDE88C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*",
"matchCriteriaId": "D60C4CBE-C104-4A12-B7DD-AFBB2C1C21AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E4033956-E928-42F7-97E9-A2357CEACEE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*",
"matchCriteriaId": "F27D0660-2F07-430B-A651-5D0B6AA763C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3120B566-2BB6-4A1F-9ED7-E099E2870919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "150D46FA-873E-4E4F-8192-BCA1076994D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"matchCriteriaId": "56113AB6-8295-4EB7-A003-79049FBB8B4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"matchCriteriaId": "362DA97E-B940-4649-803F-26D8C1D16DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "950A6BA0-C348-4B89-8C18-F2AFA467649F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "9088D042-F104-4F31-AEBB-75F5A0F03AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "F159908A-00E7-4EC8-8342-28182F547C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C49DF07-9612-43C7-9771-B76487B4A9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "5C6D8D55-DCD2-4E70-B3C6-76F2134DA336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*",
"matchCriteriaId": "C0F06FC0-6477-4589-B9CB-24B1F893EF09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6CCA07EB-B0CB-40EE-B62E-DB4C408717B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script."
},
{
"lang": "es",
"value": "dhclient en ISC DHCP 3.0.x hasta la versi\u00f3n 4.2.x en versiones anteriores a 4.2.1-P1, 3.1-ESV en versiones anteriores a 3.1-ESV-R1 y 4.1-ESV en versiones anteriores a 4.1-ESV-R2 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres shell en un nombre de anfitri\u00f3n obtenido de un mensaje DHCP, como es demostrado por un nombre de anfitri\u00f3n dado por dhclient-script."
}
],
"id": "CVE-2011-0997",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-04-08T15:17:27.387",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44037"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44048"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44089"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44090"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44103"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44127"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44180"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://securitytracker.com/id?1025300"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.osvdb.org/71493"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/47176"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44048"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44089"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://securitytracker.com/id?1025300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://www.osvdb.org/71493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/47176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-0997
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-0997",
"description": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"id": "GSD-2011-0997",
"references": [
"https://www.suse.com/security/cve/CVE-2011-0997.html",
"https://www.debian.org/security/2011/dsa-2217",
"https://www.debian.org/security/2011/dsa-2216",
"https://access.redhat.com/errata/RHSA-2011:0840",
"https://access.redhat.com/errata/RHSA-2011:0428",
"https://linux.oracle.com/cve/CVE-2011-0997.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-0997"
],
"details": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"id": "GSD-2011-0997",
"modified": "2023-12-13T01:19:04.556751Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0997",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "47176",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47176"
},
{
"name": "ADV-2011-0886",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"name": "44103",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44103"
},
{
"name": "RHSA-2011:0840",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"name": "44037",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44037"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"name": "ADV-2011-0926",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"name": "HPSBMU02752",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "44127",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44127"
},
{
"name": "MDVSA-2011:073",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"name": "SSRT100802",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "ADV-2011-0909",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"name": "oval:org.mitre.oval:def:12812",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"name": "71493",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/71493"
},
{
"name": "44090",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44090"
},
{
"name": "44048",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44048"
},
{
"name": "FEDORA-2011-4934",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997",
"refsource": "CONFIRM",
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"name": "iscdhcp-dhclient-command-execution(66580)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"name": "ADV-2011-0879",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"name": "VU#107886",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"name": "1025300",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025300"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"name": "SSA:2011-097-01",
"refsource": "SLACKWARE",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"name": "ADV-2011-1000",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"name": "ADV-2011-0915",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"name": "ADV-2011-0965",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"name": "37623",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "44180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44180"
},
{
"name": "DSA-2217",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"name": "USN-1108-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"name": "DSA-2216",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"name": "FEDORA-2011-4897",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"name": "RHSA-2011:0428",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"name": "44089",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44089"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-0997"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "44037",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44037"
},
{
"name": "71493",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://www.osvdb.org/71493"
},
{
"name": "ADV-2011-0879",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"name": "1025300",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://securitytracker.com/id?1025300"
},
{
"name": "47176",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/47176"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"name": "VU#107886",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"name": "44048",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44048"
},
{
"name": "44127",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44127"
},
{
"name": "FEDORA-2011-4897",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"name": "44089",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44089"
},
{
"name": "RHSA-2011:0428",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"name": "ADV-2011-0915",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"name": "44103",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44103"
},
{
"name": "DSA-2217",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"name": "MDVSA-2011:073",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"name": "ADV-2011-0965",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"name": "44090",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44090"
},
{
"name": "FEDORA-2011-4934",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"name": "44180",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/44180"
},
{
"name": "ADV-2011-0926",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"name": "SSA:2011-097-01",
"refsource": "SLACKWARE",
"tags": [
"Third Party Advisory"
],
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"name": "DSA-2216",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"name": "ADV-2011-0886",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"name": "ADV-2011-0909",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"name": "USN-1108-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"name": "ADV-2011-1000",
"refsource": "VUPEN",
"tags": [
"Permissions Required"
],
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"name": "RHSA-2011:0840",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"name": "HPSBMU02752",
"refsource": "HP",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"name": "GLSA-201301-06",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"name": "iscdhcp-dhclient-command-execution(66580)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"name": "37623",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"name": "oval:org.mitre.oval:def:12812",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2020-04-01T13:07Z",
"publishedDate": "2011-04-08T15:17Z"
}
}
}
GHSA-HHCJ-97JG-V79C
Vulnerability from github – Published: 2022-05-13 01:27 – Updated: 2025-04-11 03:45dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
{
"affected": [],
"aliases": [
"CVE-2011-0997"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-04-08T15:17:00Z",
"severity": "HIGH"
},
"details": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"id": "GHSA-hhcj-97jg-v79c",
"modified": "2025-04-11T03:45:48Z",
"published": "2022-05-13T01:27:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/37623"
},
{
"type": "WEB",
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44037"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44048"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44089"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44090"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44103"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44127"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44180"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1025300"
},
{
"type": "WEB",
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/71493"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/47176"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1108-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/1000"
}
],
"schema_version": "1.4.0",
"severity": []
}
VAR-201104-0082
Vulnerability from variot - Updated: 2026-03-09 22:43dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. Depending on the script and OS, this can result in execution of exploit code on the client.
CVSS Score: 6.8 (AV:A/AC:L/Au:N/C:P/I:N/A:C)
For more information on CVSS scores, visit http://nvd.nist.gov/cvss.cfm?calculator&adv&version=2
Workarounds:
On SUSE systems, it is possible to disable hostname update by setting DHCLIENT_SET_HOSTNAME="no" in /etc/sysconfig/network/dhcp.
Other systems may add following line to dhclient-script at the beginning of the set_hostname() function:
new_host_name=${new_host_name//[^-.a-zA-Z0-9]/}
In environments where filters/acls can be put into place to limit clients to accessing only legitimate dhcp servers, this will protect clients from rogue dhcp servers deliberately trying to exploit this bug. However, this will not protect from compromised servers.
Active exploits:
None known at this time. https://www.isc.org/downloads/all
No patch is available for 4.0.x as it is EOL. Anyone running 4.1.x should upgrade to 4.1-ESV-R2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2216-1 security@debian.org http://www.debian.org/security/ Nico Golde April 10, 2011 http://www.debian.org/security/faq
Package : isc-dhcp Vulnerability : missing input sanitization Problem type : remote Debian-specific: no CVE ID : CVE-2011-0997 Debian bug : 621099
Sebastian Krahmer and Marius Tomaschewski discovered that dhclient of isc-dhcp, a DHCP client, is not properly filtering shell meta-characters in certain options in DHCP server responses. These options are reused in an insecure fashion by dhclient scripts.
For the oldstable distribution (lenny), this problem has been fixed in additional update for dhcp3.
For the stable distribution (squeeze), this problem has been fixed in version 4.1.1-P1-15+squeeze2.
For the testing distribution (wheezy), this problem will be fixed soon.
For the unstable distribution (sid), this problem has been fixed in version 4.1.1-P1-16.1.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk2iJ1AACgkQHYflSXNkfP8fEwCglH3YEMa8hlo7ChGFlvT7K9v5 BMcAoIuGqJofENG1o5SiXU1/E9qEF/Am =5Q/C -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-06
http://security.gentoo.org/
Severity: Normal Title: ISC DHCP: Denial of Service Date: January 09, 2013 Bugs: #362453, #378799, #393617, #398763, #428120, #434880 ID: 201301-06
Synopsis
Multiple vulnerabilities have been found in ISC DHCP, the worst of which may allow remote Denial of Service.
Background
ISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/dhcp < 4.2.4_p2 >= 4.2.4_p2
Description
Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details.
Resolution
All ISC DHCP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.2.4_p2"
References
[ 1 ] CVE-2011-0997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997 [ 2 ] CVE-2011-2748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748 [ 3 ] CVE-2011-2749 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749 [ 4 ] CVE-2011-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539 [ 5 ] CVE-2011-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868 [ 6 ] CVE-2012-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570 [ 7 ] CVE-2012-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571 [ 8 ] CVE-2012-3954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954 [ 9 ] CVE-2012-3955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . This issue is addressed by stripping shell meta-characters in dhclient-script.
It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
TITLE: ISC DHCP "dhclient" Response Processing Input Sanitation Vulnerability
SECUNIA ADVISORY ID: SA44037
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44037/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44037
RELEASE DATE: 2011-04-07
DISCUSS ADVISORY: http://secunia.com/advisories/44037/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44037/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44037
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in ISC DHCP, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to certain shell meta-characters not being stripped or escaped when processing responses from a DHCP server. This can be exploited to submit shell commands to the "dhclient-script" script via e.g. a specially crafted "hostname" response.
The vulnerability is reported in versions 3.0.x through 4.2.x.
SOLUTION: Update to version 3.1-ESV-R1 and 4.1-ESV-R2 or 4.2.1-P1.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: The vendor credits Sebastian Krahmer and Marius Tomaschewski, SUSE Security Team.
ORIGINAL ADVISORY: https://www.isc.org/software/dhcp/advisories/cve-2011-0997
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.2.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.1-esv"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.6,
"vendor": "isc",
"version": "4.2.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.04"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.2"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.6"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.1"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.06"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.3"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.3"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "9.10"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.2"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.10"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.5"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.04"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.1-esv"
},
{
"_id": null,
"model": "dhcp",
"scope": "eq",
"trust": 1.0,
"vendor": "isc",
"version": "3.0.4"
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian gnu linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fedora",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "internet consortium",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mandriva s a",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "slackware linux",
"version": null
},
{
"_id": null,
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"_id": null,
"model": "airmac base station",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "7.6"
},
{
"_id": null,
"model": "time capsule",
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:apple:airport_base_station_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:time_capsule",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
}
]
},
"credits": {
"_id": null,
"data": "Debian",
"sources": [
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "100274"
}
],
"trust": 0.2
},
"cve": "CVE-2011-0997",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2011-0997",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2011-0997",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#107886",
"trust": 0.8,
"value": "11.34"
},
{
"author": "NVD",
"id": "CVE-2011-0997",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201104-043",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2011-0997",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"description": {
"_id": null,
"data": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. Depending on the script and OS, this can result in execution of exploit code on the client. \n\nCVSS Score: 6.8 (AV:A/AC:L/Au:N/C:P/I:N/A:C)\n\nFor more information on CVSS scores, visit http://nvd.nist.gov/cvss.cfm?calculator\u0026adv\u0026version=2 \n\nWorkarounds: \n\nOn SUSE systems, it is possible to disable hostname update by setting DHCLIENT_SET_HOSTNAME=\"no\" in /etc/sysconfig/network/dhcp. \n\nOther systems may add following line to dhclient-script at the beginning of the set_hostname() function:\n\nnew_host_name=${new_host_name//[^-.a-zA-Z0-9]/}\n\nIn environments where filters/acls can be put into place to limit clients to accessing only legitimate dhcp servers, this will protect clients from rogue dhcp servers deliberately trying to exploit this bug. However, this will not protect from compromised servers. \n\n\nActive exploits: \n\nNone known at this time. https://www.isc.org/downloads/all\n\nNo patch is available for 4.0.x as it is EOL. Anyone running 4.1.x should upgrade to 4.1-ESV-R2. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2216-1 security@debian.org\nhttp://www.debian.org/security/ Nico Golde\nApril 10, 2011 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : isc-dhcp\nVulnerability : missing input sanitization\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2011-0997\nDebian bug : 621099\n\nSebastian Krahmer and Marius Tomaschewski discovered that dhclient of\nisc-dhcp, a DHCP client, is not properly filtering shell meta-characters\nin certain options in DHCP server responses. These options are reused in\nan insecure fashion by dhclient scripts. \n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nadditional update for dhcp3. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 4.1.1-P1-15+squeeze2. \n\nFor the testing distribution (wheezy), this problem will be fixed soon. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 4.1.1-P1-16.1. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk2iJ1AACgkQHYflSXNkfP8fEwCglH3YEMa8hlo7ChGFlvT7K9v5\nBMcAoIuGqJofENG1o5SiXU1/E9qEF/Am\n=5Q/C\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ISC DHCP: Denial of Service\n Date: January 09, 2013\n Bugs: #362453, #378799, #393617, #398763, #428120, #434880\n ID: 201301-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in ISC DHCP, the worst of\nwhich may allow remote Denial of Service. \n\nBackground\n==========\n\nISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/dhcp \u003c 4.2.4_p2 \u003e= 4.2.4_p2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in ISC DHCP. Please\nreview the CVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll ISC DHCP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/dhcp-4.2.4_p2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-0997\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997\n[ 2 ] CVE-2011-2748\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748\n[ 3 ] CVE-2011-2749\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749\n[ 4 ] CVE-2011-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539\n[ 5 ] CVE-2011-4868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868\n[ 6 ] CVE-2012-3570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570\n[ 7 ] CVE-2012-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571\n[ 8 ] CVE-2012-3954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954\n[ 9 ] CVE-2012-3955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. This issue is addressed by stripping shell meta-characters\nin dhclient-script. \n\nIt is recommended that AirPort Utility 5.5.3 or later be installed\nbefore upgrading to Firmware version 7.6. ----------------------------------------------------------------------\n\n\nQ1 Factsheets released:\n\nhttp://secunia.com/resources/factsheets/2011_vendor/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nISC DHCP \"dhclient\" Response Processing Input Sanitation\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA44037\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44037/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037\n\nRELEASE DATE:\n2011-04-07\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44037/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44037/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in ISC DHCP, which can be exploited\nby malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to certain shell meta-characters not\nbeing stripped or escaped when processing responses from a DHCP\nserver. This can be exploited to submit shell commands to the\n\"dhclient-script\" script via e.g. a specially crafted \"hostname\"\nresponse. \n\nThe vulnerability is reported in versions 3.0.x through 4.2.x. \n\nSOLUTION:\nUpdate to version 3.1-ESV-R1 and 4.1-ESV-R2 or 4.2.1-P1. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Sebastian Krahmer and Marius Tomaschewski, SUSE\nSecurity Team. \n\nORIGINAL ADVISORY:\nhttps://www.isc.org/software/dhcp/advisories/cve-2011-0997\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0997"
},
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
}
],
"trust": 2.97
},
"external_ids": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#107886",
"trust": 3.3
},
{
"db": "NVD",
"id": "CVE-2011-0997",
"trust": 3.1
},
{
"db": "SECUNIA",
"id": "44037",
"trust": 1.9
},
{
"db": "VUPEN",
"id": "ADV-2011-1000",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0909",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0915",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0926",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0965",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0879",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2011-0886",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44103",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44127",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44048",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44180",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44089",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "44090",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1025300",
"trust": 1.7
},
{
"db": "JUNIPER",
"id": "JSA10761",
"trust": 1.7
},
{
"db": "BID",
"id": "47176",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "71493",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "37623",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2011-0997",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100160",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100273",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "119354",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "106987",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100274",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "100149",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"id": "VAR-201104-0082",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.413494225
},
"last_update_date": "2026-03-09T22:43:44.086000Z",
"patch": {
"_id": null,
"data": [
{
"title": "HT5005",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT5005"
},
{
"title": "ISC DHCP dhclient Response processing shell Measures to fix meta-character code execution vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113225"
},
{
"title": "Debian CVElist Bug Report Logs: isc-dhcp-client: CVE-2011-0997",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3bf1099a3f6410da5cb17491cb28710"
},
{
"title": "Ubuntu Security Notice: dhcp3 vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1108-2"
},
{
"title": "Ubuntu Security Notice: dhcp3 vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-1108-1"
},
{
"title": "Debian Security Advisories: DSA-2216-1 isc-dhcp -- missing input sanitization",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=9079594e67dfba2ce5fd90c652ce64af"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2011-2716 udhcpc insufficient checking of DHCP options",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d937c5addcd54815f7f0480b4b3a55e2"
},
{
"title": "VMware Security Advisories: VMware ESX third party updates for Service Console packages glibc and dhcp",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=386db0c9014e75eeed9029418ea6714f"
},
{
"title": "Citrix Security Bulletins: Archive: Citrix XenServer Multiple Security Updates",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=30a988053a9b9c888e66371d7b3040f2"
},
{
"title": "Threatpost",
"trust": 0.1,
"url": "https://threatpost.com/critical-rce-bug-avaya-voip-phones/147122/"
},
{
"title": "BleepingComputer",
"trust": 0.1,
"url": "https://www.bleepingcomputer.com/news/security/avaya-voip-phones-harbored-10-year-old-vulnerability/"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.6,
"url": "http://www.kb.cert.org/vuls/id/107886"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-201301-06.xml"
},
{
"trust": 1.8,
"url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997"
},
{
"trust": 1.7,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761"
},
{
"trust": 1.7,
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057888.html"
},
{
"trust": 1.7,
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/058279.html"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44037"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44048"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44089"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44090"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44103"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44127"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/44180"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1025300"
},
{
"trust": 1.7,
"url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2216"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2011/dsa-2217"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:073"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/71493"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0428.html"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0840.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/47176"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-1108-1"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0879"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0886"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0909"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0915"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0926"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/0965"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2011/1000"
},
{
"trust": 1.7,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832"
},
{
"trust": 1.7,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12812"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/37623/"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0997"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu107886/"
},
{
"trust": 0.8,
"url": "https://jvn.jp/cert/jvnvu309451/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0997"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0997"
},
{
"trust": 0.2,
"url": "http://secunia.com/"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.2,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.2,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099"
},
{
"trust": 0.1,
"url": "https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2011-0428"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/1108-2/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.isc.org/downloads/all"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/cvss.cfm?calculator\u0026adv\u0026version=2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2748"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0997"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3955"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3571"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3954"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4539"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3570"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4868"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3954"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4539"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2749"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2749"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3570"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3955"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-3571"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2748"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4868"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "http://support.apple.com/kb/ht1222"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44037"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44037/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44037/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/resources/factsheets/2011_vendor/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
},
{
"db": "VULMON",
"id": "CVE-2011-0997"
},
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "100273"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "PACKETSTORM",
"id": "100274"
},
{
"db": "PACKETSTORM",
"id": "100149"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066"
},
{
"db": "NVD",
"id": "CVE-2011-0997"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100160",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100273",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "119354",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "106987",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100274",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "100149",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2011-04-05T00:00:00",
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"date": "2011-04-08T00:00:00",
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"date": "2011-04-07T15:19:36",
"db": "PACKETSTORM",
"id": "100160",
"ident": null
},
{
"date": "2011-04-11T14:45:39",
"db": "PACKETSTORM",
"id": "100273",
"ident": null
},
{
"date": "2013-01-09T02:26:37",
"db": "PACKETSTORM",
"id": "119354",
"ident": null
},
{
"date": "2011-11-15T05:14:36",
"db": "PACKETSTORM",
"id": "106987",
"ident": null
},
{
"date": "2011-04-11T14:46:07",
"db": "PACKETSTORM",
"id": "100274",
"ident": null
},
{
"date": "2011-04-06T08:45:32",
"db": "PACKETSTORM",
"id": "100149",
"ident": null
},
{
"date": "2011-04-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"date": "2011-11-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"date": "2011-04-08T15:17:27.387000",
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2011-05-06T00:00:00",
"db": "CERT/CC",
"id": "VU#107886",
"ident": null
},
{
"date": "2020-04-01T00:00:00",
"db": "VULMON",
"id": "CVE-2011-0997",
"ident": null
},
{
"date": "2020-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201104-043",
"ident": null
},
{
"date": "2011-11-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-003066",
"ident": null
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2011-0997",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "100160"
},
{
"db": "PACKETSTORM",
"id": "119354"
},
{
"db": "PACKETSTORM",
"id": "106987"
},
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "ISC dhclient vulnerability",
"sources": [
{
"db": "CERT/CC",
"id": "VU#107886"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201104-043"
}
],
"trust": 0.6
}
}
OPENSUSE-SU-2024:10358-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "dhcp-4.3.3.P1-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the dhcp-4.3.3.P1-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10358",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10358-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1892 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1892/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2156 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3611 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3616 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0997 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2748 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-2749 page",
"url": "https://www.suse.com/security/cve/CVE-2011-2749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4539 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4868 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3570 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3571 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3954 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3955 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2266 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8605 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8605/"
}
],
"title": "dhcp-4.3.3.P1-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10358-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-client-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64",
"product_id": "dhcp-server-4.3.3.P1-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-client-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-devel-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-doc-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-relay-4.3.3.P1-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"product_id": "dhcp-server-4.3.3.P1-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-client-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-devel-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-doc-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-relay-4.3.3.P1-3.1.s390x"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x",
"product_id": "dhcp-server-4.3.3.P1-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-client-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-devel-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-doc-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-relay-4.3.3.P1-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64",
"product_id": "dhcp-server-4.3.3.P1-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-client-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-client-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-devel-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-devel-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-doc-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-doc-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-relay-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-relay-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dhcp-server-4.3.3.P1-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
},
"product_reference": "dhcp-server-4.3.3.P1-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1892",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1892"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1892",
"url": "https://www.suse.com/security/cve/CVE-2009-1892"
},
{
"category": "external",
"summary": "SUSE Bug 519413 for CVE-2009-1892",
"url": "https://bugzilla.suse.com/519413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1892"
},
{
"cve": "CVE-2010-2156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2156"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2156",
"url": "https://www.suse.com/security/cve/CVE-2010-2156"
},
{
"category": "external",
"summary": "SUSE Bug 612546 for CVE-2010-2156",
"url": "https://bugzilla.suse.com/612546"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2156"
},
{
"cve": "CVE-2010-3611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3611"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3611",
"url": "https://www.suse.com/security/cve/CVE-2010-3611"
},
{
"category": "external",
"summary": "SUSE Bug 650902 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/650902"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2010-3611",
"url": "https://bugzilla.suse.com/667655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3611"
},
{
"cve": "CVE-2010-3616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3616"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3616",
"url": "https://www.suse.com/security/cve/CVE-2010-3616"
},
{
"category": "external",
"summary": "SUSE Bug 659059 for CVE-2010-3616",
"url": "https://bugzilla.suse.com/659059"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3616"
},
{
"cve": "CVE-2011-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0413"
}
],
"notes": [
{
"category": "general",
"text": "The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0413",
"url": "https://www.suse.com/security/cve/CVE-2011-0413"
},
{
"category": "external",
"summary": "SUSE Bug 667655 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/667655"
},
{
"category": "external",
"summary": "SUSE Bug 680298 for CVE-2011-0413",
"url": "https://bugzilla.suse.com/680298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0413"
},
{
"cve": "CVE-2011-0997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0997"
}
],
"notes": [
{
"category": "general",
"text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0997",
"url": "https://www.suse.com/security/cve/CVE-2011-0997"
},
{
"category": "external",
"summary": "SUSE Bug 675052 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/675052"
},
{
"category": "external",
"summary": "SUSE Bug 689182 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/689182"
},
{
"category": "external",
"summary": "SUSE Bug 708527 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/708527"
},
{
"category": "external",
"summary": "SUSE Bug 715172 for CVE-2011-0997",
"url": "https://bugzilla.suse.com/715172"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-0997"
},
{
"cve": "CVE-2011-2748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2748"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2748",
"url": "https://www.suse.com/security/cve/CVE-2011-2748"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2748",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2748"
},
{
"cve": "CVE-2011-2749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-2749"
}
],
"notes": [
{
"category": "general",
"text": "The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-2749",
"url": "https://www.suse.com/security/cve/CVE-2011-2749"
},
{
"category": "external",
"summary": "SUSE Bug 712653 for CVE-2011-2749",
"url": "https://bugzilla.suse.com/712653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-2749"
},
{
"cve": "CVE-2011-4539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4539"
}
],
"notes": [
{
"category": "general",
"text": "dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4539",
"url": "https://www.suse.com/security/cve/CVE-2011-4539"
},
{
"category": "external",
"summary": "SUSE Bug 735610 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/735610"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4539",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4539"
},
{
"cve": "CVE-2011-4868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4868"
}
],
"notes": [
{
"category": "general",
"text": "The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4868",
"url": "https://www.suse.com/security/cve/CVE-2011-4868"
},
{
"category": "external",
"summary": "SUSE Bug 741239 for CVE-2011-4868",
"url": "https://bugzilla.suse.com/741239"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4868"
},
{
"cve": "CVE-2012-3570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3570"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3570",
"url": "https://www.suse.com/security/cve/CVE-2012-3570"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3570",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3570"
},
{
"cve": "CVE-2012-3571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3571"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3571",
"url": "https://www.suse.com/security/cve/CVE-2012-3571"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3571",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3571"
},
{
"cve": "CVE-2012-3954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3954"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3954",
"url": "https://www.suse.com/security/cve/CVE-2012-3954"
},
{
"category": "external",
"summary": "SUSE Bug 772924 for CVE-2012-3954",
"url": "https://bugzilla.suse.com/772924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-3954"
},
{
"cve": "CVE-2012-3955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3955"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3955",
"url": "https://www.suse.com/security/cve/CVE-2012-3955"
},
{
"category": "external",
"summary": "SUSE Bug 780167 for CVE-2012-3955",
"url": "https://bugzilla.suse.com/780167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2012-3955"
},
{
"cve": "CVE-2013-2266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2266"
}
],
"notes": [
{
"category": "general",
"text": "libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2266",
"url": "https://www.suse.com/security/cve/CVE-2013-2266"
},
{
"category": "external",
"summary": "SUSE Bug 811876 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811876"
},
{
"category": "external",
"summary": "SUSE Bug 811934 for CVE-2013-2266",
"url": "https://bugzilla.suse.com/811934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2266"
},
{
"cve": "CVE-2015-8605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8605"
}
],
"notes": [
{
"category": "general",
"text": "ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8605",
"url": "https://www.suse.com/security/cve/CVE-2015-8605"
},
{
"category": "external",
"summary": "SUSE Bug 961305 for CVE-2015-8605",
"url": "https://bugzilla.suse.com/961305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-client-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-devel-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-doc-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-relay-4.3.3.P1-3.1.x86_64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.aarch64",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.ppc64le",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.s390x",
"openSUSE Tumbleweed:dhcp-server-4.3.3.P1-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8605"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.