Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2005-0988
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:35:59.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "22033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "12996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12996" }, { "name": "15487", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15487" }, { "name": "oval:org.mitre.oval:def:765", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "name": "oval:org.mitre.oval:def:10242", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "name": "oval:org.mitre.oval:def:1169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "name": "SCOSA-2005.58", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "20050404 gzip TOCTOU file-permissions vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/394965" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "APPLE-SA-2006-08-01", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "22033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "12996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12996" }, { "name": "15487", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15487" }, { "name": "oval:org.mitre.oval:def:765", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "name": "oval:org.mitre.oval:def:10242", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "name": "oval:org.mitre.oval:def:1169", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "name": "SCOSA-2005.58", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "20050404 gzip TOCTOU file-permissions vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/394965" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "22033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "12996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12996" }, { "name": "15487", "refsource": "OSVDB", "url": "http://www.osvdb.org/15487" }, { "name": "oval:org.mitre.oval:def:765", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "name": "oval:org.mitre.oval:def:10242", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "name": "oval:org.mitre.oval:def:1169", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "20050404 gzip TOCTOU file-permissions vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/394965" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0988", "datePublished": "2005-04-06T04:00:00", "dateReserved": "2005-04-06T00:00:00", "dateUpdated": "2024-08-07T21:35:59.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-0988\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2024-11-20T23:56:20.520\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":3.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D50385A-1D5D-4517-B5FA-1BB60BA4C484\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752BDD31-53A2-4246-8E95-77694548DB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079F39E2-69BF-47AC-87CF-A47D37EA27F8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A585A1-FF82-418F-90F8-072458DB7816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F7EB61-55A5-4776-B0E7-3508920A6CEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"A442DE97-4485-4D95-B95D-58947585E455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE31DFF8-06AB-489D-A0C5-509C090283B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E8A6564-129A-4555-A5ED-6F65C56AE7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"237174A4-E030-4A0B-AD0B-5C463603EAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF49BF03-C25E-4737-84D5-892895C86C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7F8F11-1869-40E2-8478-28B4E946D3CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2019E0E-426B-43AF-8904-1B811AE171E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"9062BAB5-D437-49BE-A384-39F62434B70B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA1504C-14FE-4C21-A801-944041F2946F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B69535-4FB6-4FAD-AAA6-C790FF82EFAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E53C673-9D6D-42C8-A502-033E1FC28D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5FC1A-1253-4390-A4FC-573BB14EA937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4AC452-6042-409D-8673-ACAD108EE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE1009B-371A-48E2-A456-935A1F0B7D0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"C844A170-B5A7-4703-AF3B-67366D44EA8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44308D13-D935-4FF8-AB52-F0E115ED1AD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D41CB12-7894-4D25-80EC-23C56171D973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BCD9C12-EDAB-473F-9CC5-04F06B413720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"58EBC5C8-5CA8-4881-A036-179FDEBA3CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"09789843-6A1A-4CDB-97E8-89E82B79DDB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C001822-FDF8-497C-AC2C-B59A00E9ACD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"118211EF-CED7-4EB5-9669-F54C8169D4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*\",\"matchCriteriaId\":\"58288F0F-B4CE-445C-AD93-DA73E3AD6FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A405AE2-ECC4-4BB0-80DD-4736394FB217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB4AD26-6AF2-4F3A-B602-F231FAABA73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86C77AB-B8FF-4376-9B4E-C88417396F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5612FB0-8403-4A7E-B89A-D7BDFAC00078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA699BB4-94AA-40E6-A6B6-33E3D416CDA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFDA151E-E614-4A24-A34D-B6D5309110CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7818E11-1BEB-4DAA-BA7A-A278454BA4B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441BE3A0-20F4-4972-B279-19B3DB5FA14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*\",\"matchCriteriaId\":\"09BFA20B-2F31-4246-8F74-63DF1DB884EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D33C6EF-DBE1-4943-83E4-1F10670DAC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EAEA17-033A-4A50-8E39-D61154876D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE93D3D-34B4-47B7-A784-61F4479FF5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6288144-0CD7-45B6-B5A7-09B1DF14FBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FFD9D1C-A459-47AD-BC62-15631417A32F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECDEC87-0132-46B6-BD9B-A94F9B669EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E21E50A-A368-4487-A791-87366CC5C86E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E84296-9B5C-4623-A2C4-431D76FC2765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E18328E2-3CB5-4D36-8EA3-77DD909B46A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF73D76B-FBB8-4D10-8393-9FAF53392A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"F177AE1C-58C2-4575-807C-ABFFC5119FA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61EBA52A-2D8B-4FB5-866E-AE67CE1842E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B13D898-C1B6-44B9-8432-7DDB8A380E9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A612F6-E4EB-4E34-8F55-79E16C74758E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C19B266-8FE7-49ED-8678-2D522257491D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE93350-92E6-4F5C-A14C-9993CFFDBCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C4D826-A419-45F5-B91C-1445DB480916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9F2B04-A1F2-4788-A53D-C8274A758DDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5309ED-D84F-4F52-9864-5B0FEEEE5022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C441E-444B-4DF5-8491-86805C70FB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4BC012-ADE4-468F-9A25-261CD8055694\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A80E6A-6502-4A33-83BA-7DCC606D79AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6428EB-5E1A-41CB-979C-4C9402251D8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCA9879-C9F5-475A-8EC9-04D151001C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A94132F-4C47-49CC-B03C-8756613E9A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A60ED5-1D92-4B40-956F-D1801CAB9039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F629879-66F0-427B-86D8-D740E0E3F6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"C89129C5-A1DB-4018-B43A-C60C8E650080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647BA336-5538-4972-9271-383A0EC9378E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"2641EE56-6F9D-400B-B456-877F4DA79B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E0B458EA-495E-40FA-9379-C03757F7B1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"409E324A-C040-494F-A026-9DCAE01C07F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"1728AB5D-55A9-46B0-A412-6F7263CAEB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6474B775-C893-491F-A074-802AFB1FEDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE2E73-9536-41A9-B83B-0A06B54857F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"F9440B25-D206-4914-9557-B5F030890DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E9933557-3BCA-4D92-AD4F-27758A0D3347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"10A60552-15A5-4E95-B3CE-99A4B26260C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D74A418-50F0-42C0-ABBC-BBBE718FF025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"84A50ED3-FD0D-4038-B3E7-CC65D166C968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*\",\"matchCriteriaId\":\"777F9EC0-2919-45CA-BFF8-78A02537C513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67735E5-E43E-4164-BDB2-ADC6E0288E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB70F82-52BB-4D0D-9A24-9AF67278466D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1267DA81-5D2A-4F5C-BF87-F46813E21E19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"065FF0F1-7FAC-4584-92EA-EAA87DC76FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839D2945-1417-43F5-A526-A14C491CBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06DCF0D-3241-453A-A0E4-937FE25EC404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B484D091-62DE-4EF2-AC54-26896CA8B315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428589A-0BD2-469E-978D-38239117D972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6E94583A-5184-462E-9FC4-57B35DA06DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"E905FAAD-37B6-4DD0-A752-2974F8336273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"3BD12488-1ED8-4751-ABF5-3578D54750A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"AE3733CF-4C88-443C-9B90-6477C9C500D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*\",\"matchCriteriaId\":\"9C500A75-D75E-45B4-B582-0F0DF27C3C04\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-357.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18100\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22033\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-752\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/15487\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/394965\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/12996\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-357.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18100\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/21253\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2005/dsa-752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/15487\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/394965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/12996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/19289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA06-214A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2006/3101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
gsd-2005-0988
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-0988", "description": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "id": "GSD-2005-0988", "references": [ "https://www.suse.com/security/cve/CVE-2005-0988.html", "https://www.debian.org/security/2005/dsa-752", "https://access.redhat.com/errata/RHSA-2005:357" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-0988" ], "details": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "id": "GSD-2005-0988", "modified": "2023-12-13T01:20:08.530171Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "22033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22033" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "21253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21253" }, { "name": "DSA-752", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "101816", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "19289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19289" }, { "name": "TA06-214A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "12996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12996" }, { "name": "15487", "refsource": "OSVDB", "url": "http://www.osvdb.org/15487" }, { "name": "oval:org.mitre.oval:def:765", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "name": "oval:org.mitre.oval:def:10242", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "name": "oval:org.mitre.oval:def:1169", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18100" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "20050404 gzip TOCTOU file-permissions vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/394965" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0988" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20050404 gzip TOCTOU file-permissions vulnerability", "refsource": "BUGTRAQ", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/394965" }, { "name": "12996", "refsource": "BID", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12996" }, { "name": "DSA-752", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-752" }, { "name": "SCOSA-2005.58", "refsource": "SCO", "tags": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "name": "18100", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18100" }, { "name": "RHSA-2005:357", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "name": "101816", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "name": "APPLE-SA-2006-08-01", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "name": "21253", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/21253" }, { "name": "15487", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/15487" }, { "name": "19289", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/19289" }, { "name": "SSA:2006-262", "refsource": "SLACKWARE", "tags": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "name": "22033", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22033" }, { "name": "TA06-214A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "name": "ADV-2006-3101", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "name": "oval:org.mitre.oval:def:765", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "name": "oval:org.mitre.oval:def:1169", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "name": "oval:org.mitre.oval:def:10242", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:30Z", "publishedDate": "2005-05-02T04:00Z" } } }
fkie_cve-2005-0988
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0D50385A-1D5D-4517-B5FA-1BB60BA4C484", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "matchCriteriaId": "752BDD31-53A2-4246-8E95-77694548DB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "079F39E2-69BF-47AC-87CF-A47D37EA27F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0A585A1-FF82-418F-90F8-072458DB7816", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "E3F7EB61-55A5-4776-B0E7-3508920A6CEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", "matchCriteriaId": "A442DE97-4485-4D95-B95D-58947585E455", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", "matchCriteriaId": "1E8A6564-129A-4555-A5ED-6F65C56AE7B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", "matchCriteriaId": "237174A4-E030-4A0B-AD0B-5C463603EAA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", "matchCriteriaId": "5D7F8F11-1869-40E2-8478-28B4E946D3CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", "matchCriteriaId": "9062BAB5-D437-49BE-A384-39F62434B70B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", "matchCriteriaId": "3BA1504C-14FE-4C21-A801-944041F2946F", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", "matchCriteriaId": "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", "matchCriteriaId": "6E53C673-9D6D-42C8-A502-033E1FC28D97", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", "matchCriteriaId": "6F4AC452-6042-409D-8673-ACAD108EE3B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", "matchCriteriaId": "9BCD9C12-EDAB-473F-9CC5-04F06B413720", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", "matchCriteriaId": "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", "matchCriteriaId": "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", "matchCriteriaId": "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", "matchCriteriaId": "9A405AE2-ECC4-4BB0-80DD-4736394FB217", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", "matchCriteriaId": "E5612FB0-8403-4A7E-B89A-D7BDFAC00078", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", "matchCriteriaId": "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", "matchCriteriaId": "AFDA151E-E614-4A24-A34D-B6D5309110CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", "matchCriteriaId": "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", "matchCriteriaId": "09BFA20B-2F31-4246-8F74-63DF1DB884EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", "matchCriteriaId": "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", "matchCriteriaId": "4AE93D3D-34B4-47B7-A784-61F4479FF5A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", "matchCriteriaId": "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "matchCriteriaId": "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "matchCriteriaId": "6E21E50A-A368-4487-A791-87366CC5C86E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "matchCriteriaId": "43E84296-9B5C-4623-A2C4-431D76FC2765", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "matchCriteriaId": "E18328E2-3CB5-4D36-8EA3-77DD909B46A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "matchCriteriaId": "EF73D76B-FBB8-4D10-8393-9FAF53392A4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "matchCriteriaId": "F177AE1C-58C2-4575-807C-ABFFC5119FA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "3B13D898-C1B6-44B9-8432-7DDB8A380E9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "matchCriteriaId": "51A612F6-E4EB-4E34-8F55-79E16C74758E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "matchCriteriaId": "5C19B266-8FE7-49ED-8678-2D522257491D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "15C4D826-A419-45F5-B91C-1445DB480916", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "matchCriteriaId": "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "matchCriteriaId": "8E4BC012-ADE4-468F-9A25-261CD8055694", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "matchCriteriaId": "0D6428EB-5E1A-41CB-979C-4C9402251D8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "matchCriteriaId": "2DCA9879-C9F5-475A-8EC9-04D151001C8D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "matchCriteriaId": "0A94132F-4C47-49CC-B03C-8756613E9A38", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "matchCriteriaId": "46A60ED5-1D92-4B40-956F-D1801CAB9039", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "matchCriteriaId": "3F629879-66F0-427B-86D8-D740E0E3F6E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "matchCriteriaId": "C89129C5-A1DB-4018-B43A-C60C8E650080", "vulnerable": true }, { "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "matchCriteriaId": "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "matchCriteriaId": "409E324A-C040-494F-A026-9DCAE01C07F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "matchCriteriaId": "6474B775-C893-491F-A074-802AFB1FEDD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "matchCriteriaId": "84A50ED3-FD0D-4038-B3E7-CC65D166C968", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "matchCriteriaId": "777F9EC0-2919-45CA-BFF8-78A02537C513", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5AB70F82-52BB-4D0D-9A24-9AF67278466D", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*", "matchCriteriaId": "1267DA81-5D2A-4F5C-BF87-F46813E21E19", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*", "matchCriteriaId": "74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "matchCriteriaId": "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "839D2945-1417-43F5-A526-A14C491CBCEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "E06DCF0D-3241-453A-A0E4-937FE25EC404", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "B484D091-62DE-4EF2-AC54-26896CA8B315", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9428589A-0BD2-469E-978D-38239117D972", "vulnerable": true }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "matchCriteriaId": "6E94583A-5184-462E-9FC4-57B35DA06DA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "matchCriteriaId": "E905FAAD-37B6-4DD0-A752-2974F8336273", "vulnerable": true }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "matchCriteriaId": "3BD12488-1ED8-4751-ABF5-3578D54750A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "matchCriteriaId": "AE3733CF-4C88-443C-9B90-6477C9C500D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "matchCriteriaId": "9C500A75-D75E-45B4-B582-0F0DF27C3C04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete." } ], "id": "CVE-2005-0988", "lastModified": "2024-11-20T23:56:20.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18100" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21253" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22033" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-752" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/15487" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/394965" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12996" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/15487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/394965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "lastModified": "2007-03-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2005_357
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gzip package is now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The gzip package contains the GNU gzip data compression program.\n\nA bug was found in the way zgrep processes file names. If a user can be\ntricked into running zgrep on a file with a carefully crafted file name,\narbitrary commands could be executed as the user running zgrep. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2005-0758 to this issue.\n\nA bug was found in the way gunzip modifies permissions of files being\ndecompressed. A local attacker with write permissions in the directory in\nwhich a victim is decompressing a file could remove the file being written\nand replace it with a hard link to a different file owned by the victim. \ngunzip then gives the linked file the permissions of the uncompressed file.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0988 to this issue.\n\nA directory traversal bug was found in the way gunzip processes the -N\nflag. If a victim decompresses a file with the -N flag, gunzip fails to\nsanitize the path which could result in a file owned by the victim being\noverwritten. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.\n\nUsers of gzip should upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:357", "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "121514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121514" }, { "category": "external", "summary": "155745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155745" }, { "category": "external", "summary": "156266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156266" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_357.json" } ], "title": "Red Hat Security Advisory: gzip security update", "tracking": { "current_release_date": "2024-11-21T23:38:09+00:00", "generator": { "date": "2024-11-21T23:38:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:357", "initial_release_date": "2005-06-13T12:12:00+00:00", "revision_history": [ { "date": "2005-06-13T12:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-06-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:38:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.src", "product": { "name": "gzip-0:1.3.3-15.rhel4.src", "product_id": "gzip-0:1.3.3-15.rhel4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=src" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.src", "product": { "name": "gzip-0:1.3.3-12.rhel3.src", "product_id": "gzip-0:1.3.3-12.rhel3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-0:1.3.3-15.rhel4.i386", "product_id": "gzip-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-0:1.3.3-12.rhel3.i386", "product_id": "gzip-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390", "product_id": "gzip-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390", "product_id": "gzip-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0758", "discovery_date": "2004-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617573" } ], "notes": [ { "category": "description", "text": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0758" }, { "category": "external", "summary": "RHBZ#1617573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0758", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" } ], "release_date": "2005-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0988", "discovery_date": "2005-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617595" } ], "notes": [ { "category": "description", "text": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0988" }, { "category": "external", "summary": "RHBZ#1617595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0988", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0988" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" } ], "release_date": "2005-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-1228", "discovery_date": "2005-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617616" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1228" }, { "category": "external", "summary": "RHBZ#1617616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1228", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" } ], "release_date": "2005-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2005:357
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gzip package is now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The gzip package contains the GNU gzip data compression program.\n\nA bug was found in the way zgrep processes file names. If a user can be\ntricked into running zgrep on a file with a carefully crafted file name,\narbitrary commands could be executed as the user running zgrep. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2005-0758 to this issue.\n\nA bug was found in the way gunzip modifies permissions of files being\ndecompressed. A local attacker with write permissions in the directory in\nwhich a victim is decompressing a file could remove the file being written\nand replace it with a hard link to a different file owned by the victim. \ngunzip then gives the linked file the permissions of the uncompressed file.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0988 to this issue.\n\nA directory traversal bug was found in the way gunzip processes the -N\nflag. If a victim decompresses a file with the -N flag, gunzip fails to\nsanitize the path which could result in a file owned by the victim being\noverwritten. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.\n\nUsers of gzip should upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:357", "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "121514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121514" }, { "category": "external", "summary": "155745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155745" }, { "category": "external", "summary": "156266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156266" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_357.json" } ], "title": "Red Hat Security Advisory: gzip security update", "tracking": { "current_release_date": "2024-11-21T23:38:09+00:00", "generator": { "date": "2024-11-21T23:38:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:357", "initial_release_date": "2005-06-13T12:12:00+00:00", "revision_history": [ { "date": "2005-06-13T12:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-06-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:38:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.src", "product": { "name": "gzip-0:1.3.3-15.rhel4.src", "product_id": "gzip-0:1.3.3-15.rhel4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=src" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.src", "product": { "name": "gzip-0:1.3.3-12.rhel3.src", "product_id": "gzip-0:1.3.3-12.rhel3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-0:1.3.3-15.rhel4.i386", "product_id": "gzip-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-0:1.3.3-12.rhel3.i386", "product_id": "gzip-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390", "product_id": "gzip-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390", "product_id": "gzip-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0758", "discovery_date": "2004-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617573" } ], "notes": [ { "category": "description", "text": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0758" }, { "category": "external", "summary": "RHBZ#1617573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0758", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" } ], "release_date": "2005-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0988", "discovery_date": "2005-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617595" } ], "notes": [ { "category": "description", "text": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0988" }, { "category": "external", "summary": "RHBZ#1617595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0988", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0988" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" } ], "release_date": "2005-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-1228", "discovery_date": "2005-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617616" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1228" }, { "category": "external", "summary": "RHBZ#1617616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1228", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" } ], "release_date": "2005-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
RHSA-2005:357
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gzip package is now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "The gzip package contains the GNU gzip data compression program.\n\nA bug was found in the way zgrep processes file names. If a user can be\ntricked into running zgrep on a file with a carefully crafted file name,\narbitrary commands could be executed as the user running zgrep. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2005-0758 to this issue.\n\nA bug was found in the way gunzip modifies permissions of files being\ndecompressed. A local attacker with write permissions in the directory in\nwhich a victim is decompressing a file could remove the file being written\nand replace it with a hard link to a different file owned by the victim. \ngunzip then gives the linked file the permissions of the uncompressed file.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2005-0988 to this issue.\n\nA directory traversal bug was found in the way gunzip processes the -N\nflag. If a victim decompresses a file with the -N flag, gunzip fails to\nsanitize the path which could result in a file owned by the victim being\noverwritten. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-1228 to this issue.\n\nUsers of gzip should upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:357", "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "121514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121514" }, { "category": "external", "summary": "155745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155745" }, { "category": "external", "summary": "156266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156266" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_357.json" } ], "title": "Red Hat Security Advisory: gzip security update", "tracking": { "current_release_date": "2024-11-21T23:38:09+00:00", "generator": { "date": "2024-11-21T23:38:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:357", "initial_release_date": "2005-06-13T12:12:00+00:00", "revision_history": [ { "date": "2005-06-13T12:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-06-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:38:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ia64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ia64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.src", "product": { "name": "gzip-0:1.3.3-15.rhel4.src", "product_id": "gzip-0:1.3.3-15.rhel4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=src" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.src", "product": { "name": "gzip-0:1.3.3-12.rhel3.src", "product_id": "gzip-0:1.3.3-12.rhel3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=x86_64" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-0:1.3.3-15.rhel4.i386", "product_id": "gzip-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=i386" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-0:1.3.3-12.rhel3.i386", "product_id": "gzip-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=i386" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=ppc" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=ppc" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390x" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390x" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gzip-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-0:1.3.3-15.rhel4.s390", "product_id": "gzip-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_id": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-15.rhel4?arch=s390" } } }, { "category": "product_version", "name": "gzip-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-0:1.3.3-12.rhel3.s390", "product_id": "gzip-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip@1.3.3-12.rhel3?arch=s390" } } }, { "category": "product_version", "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_id": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gzip-debuginfo@1.3.3-12.rhel3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.src" }, "product_reference": "gzip-0:1.3.3-12.rhel3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.src" }, "product_reference": "gzip-0:1.3.3-15.rhel4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" }, "product_reference": "gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0758", "discovery_date": "2004-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617573" } ], "notes": [ { "category": "description", "text": "zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0758" }, { "category": "external", "summary": "RHBZ#1617573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0758", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" } ], "release_date": "2005-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0988", "discovery_date": "2005-04-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617595" } ], "notes": [ { "category": "description", "text": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0988" }, { "category": "external", "summary": "RHBZ#1617595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0988", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0988" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" } ], "release_date": "2005-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-1228", "discovery_date": "2005-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617616" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1228" }, { "category": "external", "summary": "RHBZ#1617616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1228", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" } ], "release_date": "2005-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-06-13T12:12:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS:gzip-0:1.3.3-12.rhel3.i386", "3AS:gzip-0:1.3.3-12.rhel3.ia64", "3AS:gzip-0:1.3.3-12.rhel3.ppc", "3AS:gzip-0:1.3.3-12.rhel3.s390", "3AS:gzip-0:1.3.3-12.rhel3.s390x", "3AS:gzip-0:1.3.3-12.rhel3.src", "3AS:gzip-0:1.3.3-12.rhel3.x86_64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3AS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-0:1.3.3-12.rhel3.src", "3Desktop:gzip-0:1.3.3-12.rhel3.x86_64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3Desktop:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-0:1.3.3-12.rhel3.i386", "3ES:gzip-0:1.3.3-12.rhel3.ia64", "3ES:gzip-0:1.3.3-12.rhel3.ppc", "3ES:gzip-0:1.3.3-12.rhel3.s390", "3ES:gzip-0:1.3.3-12.rhel3.s390x", "3ES:gzip-0:1.3.3-12.rhel3.src", "3ES:gzip-0:1.3.3-12.rhel3.x86_64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3ES:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-0:1.3.3-12.rhel3.i386", "3WS:gzip-0:1.3.3-12.rhel3.ia64", "3WS:gzip-0:1.3.3-12.rhel3.ppc", "3WS:gzip-0:1.3.3-12.rhel3.s390", "3WS:gzip-0:1.3.3-12.rhel3.s390x", "3WS:gzip-0:1.3.3-12.rhel3.src", "3WS:gzip-0:1.3.3-12.rhel3.x86_64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.i386", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ia64", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.ppc", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.s390x", "3WS:gzip-debuginfo-0:1.3.3-12.rhel3.x86_64", "4AS:gzip-0:1.3.3-15.rhel4.i386", "4AS:gzip-0:1.3.3-15.rhel4.ia64", "4AS:gzip-0:1.3.3-15.rhel4.ppc", "4AS:gzip-0:1.3.3-15.rhel4.s390", "4AS:gzip-0:1.3.3-15.rhel4.s390x", "4AS:gzip-0:1.3.3-15.rhel4.src", "4AS:gzip-0:1.3.3-15.rhel4.x86_64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4AS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-0:1.3.3-15.rhel4.src", "4Desktop:gzip-0:1.3.3-15.rhel4.x86_64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4Desktop:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-0:1.3.3-15.rhel4.i386", "4ES:gzip-0:1.3.3-15.rhel4.ia64", "4ES:gzip-0:1.3.3-15.rhel4.ppc", "4ES:gzip-0:1.3.3-15.rhel4.s390", "4ES:gzip-0:1.3.3-15.rhel4.s390x", "4ES:gzip-0:1.3.3-15.rhel4.src", "4ES:gzip-0:1.3.3-15.rhel4.x86_64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4ES:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-0:1.3.3-15.rhel4.i386", "4WS:gzip-0:1.3.3-15.rhel4.ia64", "4WS:gzip-0:1.3.3-15.rhel4.ppc", "4WS:gzip-0:1.3.3-15.rhel4.s390", "4WS:gzip-0:1.3.3-15.rhel4.s390x", "4WS:gzip-0:1.3.3-15.rhel4.src", "4WS:gzip-0:1.3.3-15.rhel4.x86_64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.i386", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ia64", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.ppc", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.s390x", "4WS:gzip-debuginfo-0:1.3.3-15.rhel4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:357" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
var-200504-0293
Vulnerability from variot
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The gzip utility is reported prone to a security weakness; the issue occurs only when an archive is extracted into a world- or group-writeable directory. This weakness is reported to affect gzip 1.2.4, 1.3.3, and previous versions.
Want a new IT Security job?
Vacant positions at Secunia: http://secunia.com/secunia_vacancies/
TITLE: gzip Directory Traversal Vulnerability
SECUNIA ADVISORY ID: SA15047
VERIFY ADVISORY: http://secunia.com/advisories/15047/
CRITICAL: Less critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: gzip 1.x http://secunia.com/product/4220/
DESCRIPTION: Ulf H\xe4rnhammar has reported a vulnerability in gzip, which potentially can be exploited by malicious people to compromise a user's system. This makes it possible to have a file extracted to an arbitrary location outside the current directory via directory traversal attacks.
The vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3, 1.3.4 and 1.3.5. Other versions may also be affected.
SOLUTION: Do not extract untrusted ".gz" files with the "-N" flag.
PROVIDED AND/OR DISCOVERED BY: Ulf H\xe4rnhammar
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200505-05
http://security.gentoo.org/
Severity: Normal Title: gzip: Multiple vulnerabilities Date: May 09, 2005 Bugs: #89946, #90626 ID: 200505-05
Synopsis
gzip contains multiple vulnerabilities potentially allowing an attacker to execute arbitrary commands. The zgrep utility improperly sanitizes arguments, which may come from an untrusted source (CAN-2005-0758).
Impact
These vulnerabilities could allow arbitrary command execution, changing the permissions of arbitrary files, and installation of files to an aribitrary location in the filesystem.
Workaround
There is no known workaround at this time.
Resolution
All gzip users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"
References
[ 1 ] CAN-2005-0758 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758 [ 2 ] CAN-2005-0988 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988 [ 3 ] CAN-2005-1228 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200505-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0293", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "ubuntu", "version": "5.04" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "ubuntu", "version": "4.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.1" }, { "model": "workstation", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "server", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "gzip", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "1.3.3" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.6.2" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.8" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.0" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.2" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.7" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.9" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.2" }, { "model": "server", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "8.0" }, { "model": "desktop", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "server", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.10" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.1" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.6" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.3" }, { "model": "gzip", "scope": "eq", "trust": 1.3, "vendor": "gnu", "version": "1.2.4" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.3" }, { "model": "workstation", "scope": "eq", "trust": 1.3, "vendor": "turbolinux", "version": "7.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.5" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.2" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "5.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.3, "vendor": "freebsd", "version": "4.4" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2.0" }, { "model": "appliance server", "scope": "eq", "trust": 1.0, "vendor": "turbolinux", "version": "1.0_hosting" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "5.2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "4.11" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "linux advanced workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "5.4" }, { "model": "appliance server", "scope": "eq", "trust": 1.0, "vendor": "turbolinux", "version": "1.0_workgroup" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "gzip", "scope": "eq", "trust": 1.0, "vendor": "gnu", "version": "1.2.4a" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.1" }, { "model": "home", "scope": "eq", "trust": 1.0, "vendor": "turbolinux", "version": "*" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "-stablepre122300", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "network messaging", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0.x" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "-release-p7", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "-release-p32", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.5.13" }, { "model": "integrated management", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "advanced linux environment", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "propack", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "3.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "-stablepre2002-03-07", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "3-dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "4.7" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "-release-p8", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux ia64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "-release-p17", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.4" }, { "model": "alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.0" }, { "model": "-release/alpha", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "integrated management", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "solaris 10.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.2" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "cvlan", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "-release-p20", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "-release-p38", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "gzip", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.3.2" }, { "model": "-release-p14", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.8" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "gzip a", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.2.4" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.1.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "solaris 9 x86 update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "-release-p5", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "gzip", "scope": "eq", "trust": 0.3, "vendor": "gnu", "version": "1.3.5" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.04" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "-stablepre050201", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "-stable", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "-prerelease", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "-release-p3", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "-release-p42", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "converged communications server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "linux ia32", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "4.1" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "6.0" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "-release", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.2" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "-releng", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.4" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.10" } ], "sources": [ { "db": "BID", "id": "12996" }, { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "CNNVD", "id": "CNNVD-200505-423" }, { "db": "NVD", "id": "CVE-2005-0988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000229" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dino Dai Zovi ddaizovi@atstake.com Tom Ferris tommy@security-protocols.com Neil ArchibaldRob MiddletonGael DelalleauJesse Ruderman jruderman@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-423" } ], "trust": 0.6 }, "cve": "CVE-2005-0988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "CVE-2005-0988", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-0988", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2005-0988", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-200505-423", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "CNNVD", "id": "CNNVD-200505-423" }, { "db": "NVD", "id": "CVE-2005-0988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue \"..\" Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The gzip utility is reported prone to a security weakness; the issue occurs only when an archive is extracted into a world- or group-writeable directory. \nThis weakness is reported to affect gzip 1.2.4, 1.3.3, and previous versions. \n----------------------------------------------------------------------\n\nWant a new IT Security job?\n\nVacant positions at Secunia:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\ngzip Directory Traversal Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15047\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15047/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\ngzip 1.x\nhttp://secunia.com/product/4220/\n\nDESCRIPTION:\nUlf H\\xe4rnhammar has reported a vulnerability in gzip, which\npotentially can be exploited by malicious people to compromise a\nuser\u0027s system. This makes it\npossible to have a file extracted to an arbitrary location outside\nthe current directory via directory traversal attacks. \n\nThe vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3,\n1.3.4 and 1.3.5. Other versions may also be affected. \n\nSOLUTION:\nDo not extract untrusted \".gz\" files with the \"-N\" flag. \n\nPROVIDED AND/OR DISCOVERED BY:\nUlf H\\xe4rnhammar\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200505-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: gzip: Multiple vulnerabilities\n Date: May 09, 2005\n Bugs: #89946, #90626\n ID: 200505-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\ngzip contains multiple vulnerabilities potentially allowing an attacker\nto execute arbitrary commands. The zgrep utility improperly\nsanitizes arguments, which may come from an untrusted source\n(CAN-2005-0758). \n\nImpact\n======\n\nThese vulnerabilities could allow arbitrary command execution, changing\nthe permissions of arbitrary files, and installation of files to an\naribitrary location in the filesystem. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll gzip users should upgrade to the latest stable version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-arch/gzip-1.3.5-r6\"\n\nReferences\n==========\n\n [ 1 ] CAN-2005-0758\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758\n [ 2 ] CAN-2005-0988\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988\n [ 3 ] CAN-2005-1228\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200505-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0988" }, { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "BID", "id": "12996" }, { "db": "PACKETSTORM", "id": "37396" }, { "db": "PACKETSTORM", "id": "38412" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0988", "trust": 2.8 }, { "db": "BID", "id": "12996", "trust": 2.7 }, { "db": "BID", "id": "19289", "trust": 1.6 }, { "db": "SECUNIA", "id": "18100", "trust": 1.6 }, { "db": "SECUNIA", "id": "21253", "trust": 1.6 }, { "db": "SECUNIA", "id": "22033", "trust": 1.6 }, { "db": "OSVDB", "id": "15487", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2006-3101", "trust": 1.6 }, { "db": "USCERT", "id": "TA06-214A", "trust": 1.6 }, { "db": "SECUNIA", "id": "15047", "trust": 0.9 }, { "db": "BID", "id": "13582", "trust": 0.8 }, { "db": "BID", "id": "13290", "trust": 0.8 }, { "db": "XF", "id": "20199", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000229", "trust": 0.8 }, { "db": "SCO", "id": "SCOSA-2005.58", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:1169", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:765", "trust": 0.6 }, { "db": "SLACKWARE", "id": "SSA:2006-262", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20050404 GZIP TOCTOU FILE-PERMISSIONS VULNERABILITY", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-214A", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:357", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-08-01", "trust": 0.6 }, { "db": "SUNALERT", "id": "101816", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-752", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200505-423", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "37396", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "38412", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "12996" }, { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "PACKETSTORM", "id": "37396" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-423" }, { "db": "NVD", "id": "CVE-2005-0988" } ] }, "id": "VAR-200504-0293", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4615448 }, "last_update_date": "2024-11-29T19:54:38.738000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "AXSA-2005-51:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=87" }, { "title": "AXSA-2006-27:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=342" }, { "title": "bzip2", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/bzip2.html" }, { "title": "gzip", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/gzip.html" }, { "title": "AXSA-2005-48:1", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=86" }, { "title": "RHSA-2005:357", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "title": "RHSA-2005:474", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-474.html" }, { "title": "101816", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "title": "101816", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-3" }, { "title": "TLSA-2005-59", "trust": 0.8, "url": "http://www.turbolinux.com/security/2005/TLSA-2005-59.txt" }, { "title": "RHSA-2005:357", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-357J.html" }, { "title": "RHSA-2005:474", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-474J.html" }, { "title": "TLSA-2005-59", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2005/TLSA-2005-59j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000229" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/12996" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2005-357.html" }, { "trust": 1.9, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "trust": 1.6, "url": "http://www.us-cert.gov/cas/techalerts/ta06-214a.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/19289" }, { "trust": 1.6, "url": "http://www.securityfocus.com/archive/1/394965" }, { "trust": 1.6, "url": "http://www.osvdb.org/15487" }, { "trust": 1.6, "url": "http://www.debian.org/security/2005/dsa-752" }, { "trust": 1.6, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "trust": 1.6, "url": "http://secunia.com/advisories/22033" }, { "trust": 1.6, "url": "http://secunia.com/advisories/21253" }, { "trust": 1.6, "url": "http://secunia.com/advisories/18100" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html" }, { "trust": 1.6, "url": "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.58/scosa-2005.58.txt" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a765" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1169" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10242" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0988" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/20199" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0988" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15047" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13582" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/13290" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/3101" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:765" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:1169" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-172.pdf" }, { "trust": 0.3, "url": "http://www.gzip.org/" }, { "trust": 0.3, "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4532.html" }, { "trust": 0.3, "url": "/archive/1/394965" }, { "trust": 0.3, "url": "/archive/1/395622" }, { "trust": 0.3, "url": "/archive/1/395715" }, { "trust": 0.3, "url": "/archive/1/395718" }, { "trust": 0.3, "url": "/archive/1/395909" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/4220/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/15047/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0758" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-1228" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0988" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0758" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.0" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1228" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200505-05.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0988" } ], "sources": [ { "db": "BID", "id": "12996" }, { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "PACKETSTORM", "id": "37396" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-423" }, { "db": "NVD", "id": "CVE-2005-0988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "12996" }, { "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "db": "PACKETSTORM", "id": "37396" }, { "db": "PACKETSTORM", "id": "38412" }, { "db": "CNNVD", "id": "CNNVD-200505-423" }, { "db": "NVD", "id": "CVE-2005-0988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-04-05T00:00:00", "db": "BID", "id": "12996" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "date": "2005-05-28T06:29:35", "db": "PACKETSTORM", "id": "37396" }, { "date": "2005-07-02T00:59:07", "db": "PACKETSTORM", "id": "38412" }, { "date": "2005-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-423" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-08-02T20:46:00", "db": "BID", "id": "12996" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000229" }, { "date": "2007-05-11T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-423" }, { "date": "2024-11-20T23:56:20.520000", "db": "NVD", "id": "CVE-2005-0988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "12996" }, { "db": "CNNVD", "id": "CNNVD-200505-423" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "gzip of gunzip Race condition vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000229" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competitive condition", "sources": [ { "db": "CNNVD", "id": "CNNVD-200505-423" } ], "trust": 0.6 } }
ghsa-pmqf-rc4m-6f55
Vulnerability from github
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
{ "affected": [], "aliases": [ "CVE-2005-0988" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-05-02T04:00:00Z", "severity": "LOW" }, "details": "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", "id": "GHSA-pmqf-rc4m-6f55", "modified": "2022-05-03T03:14:05Z", "published": "2022-05-03T03:14:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/18100" }, { "type": "WEB", "url": "http://secunia.com/advisories/21253" }, { "type": "WEB", "url": "http://secunia.com/advisories/22033" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.555852" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-752" }, { "type": "WEB", "url": "http://www.osvdb.org/15487" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/394965" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12996" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19289" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3101" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.