Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2007-6420
Vulnerability from cvelistv5
Published
2008-01-12 00:00
Modified
2024-08-07 16:02
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34219" }, { "name": "31026", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31026" }, { "name": "3523", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3523" }, { "name": "SUSE-SR:2008:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "27236", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27236" }, { "name": "USN-731-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "name": "ADV-2009-0320", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0966", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "name": "33797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33797" }, { "name": "20080729 rPSA-2008-0236-1 httpd mod_ssl", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "name": "20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "name": "GLSA-200807-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "HPSBUX02401", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:8371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "name": "SSRT090005", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:07:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34219" }, { "name": "31026", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31026" }, { "name": "3523", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3523" }, { "name": "SUSE-SR:2008:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "27236", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27236" }, { "name": "USN-731-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "name": "ADV-2009-0320", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0966", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "name": "33797", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33797" }, { "name": "20080729 rPSA-2008-0236-1 httpd mod_ssl", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "name": "20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "name": "GLSA-200807-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "HPSBUX02401", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:8371", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "name": "SSRT090005", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34219", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34219" }, { "name": "31026", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31026" }, { "name": "3523", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3523" }, { "name": "SUSE-SR:2008:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "27236", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27236" }, { "name": "USN-731-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "name": "ADV-2009-0320", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "name": "32222", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0966", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "name": "33797", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33797" }, { "name": "20080729 rPSA-2008-0236-1 httpd mod_ssl", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "name": "20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "name": "GLSA-200807-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "HPSBUX02401", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:8371", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "name": "SSRT090005", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6420", "datePublished": "2008-01-12T00:00:00", "dateReserved": "2007-12-17T00:00:00", "dateUpdated": "2024-08-07T16:02:36.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-6420\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-01-12T00:46:00.000\",\"lastModified\":\"2024-11-21T00:40:06.857\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de tipo cross-site request forgery (CSRF) en el controlador-balanceador en el componente mod_proxy_balancer en el servidor HTTP de Apache versi\u00f3n 2.2.x, permite a los atacantes remotos conseguir privilegios por medio de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AD11FB-529C-404E-A13B-284F145322B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCBBB7FE-35FC-4515-8393-5145339FCE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F519633F-AB68-495A-B85E-FD41F9F752CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A894BED6-C97D-4DA4-A13D-9CB2B3306BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A81C75-4C54-43FE-9317-E15EDFEC06B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A847D1-5AD5-4EFD-B165-7602AFC1E656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823BF8BE-2309-4F67-A5E2-EAD98F723468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0507E91-567A-41D6-A7E5-5088A39F75FB\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31026\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/33797\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/34219\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200807-06.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3523\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0966.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/486169/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/494858/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27236\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-731-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0320\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/31026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/32222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/33797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://secunia.com/advisories/34219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200807-06.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3523\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0966.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/486169/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/494858/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/31681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-731-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}],\"vendorComments\":[{\"organization\":\"Mandriva\",\"comment\":\"Mandriva ships mod_proxy_balancer but will not be issuing updates to correct this flaw as the security risk is quite low due to the fact that is not enabled by default, the at-risk user would have to be authenticated, and successful exploitation would be limited to a denial of service on the web server.\",\"lastModified\":\"2008-03-12T00:00:00\"},{\"organization\":\"Red Hat\",\"comment\":\"mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.\\n\",\"lastModified\":\"2008-01-24T00:00:00\"},{\"organization\":\"Apache\",\"comment\":\"Fixed in Apache HTTP Server 2.2.9. http://httpd.apache.org/security/vulnerabilities_22.html\",\"lastModified\":\"2008-07-02T00:00:00\"}]}}" } }
fkie_cve-2007-6420
Vulnerability from fkie_nvd
Published
2008-01-12 00:46
Modified
2024-11-21 00:40
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | 2.2.0 | |
apache | http_server | 2.2.2 | |
apache | http_server | 2.2.3 | |
apache | http_server | 2.2.4 | |
apache | http_server | 2.2.5 | |
apache | http_server | 2.2.6 | |
apache | http_server | 2.2.8 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 7.10 | |
canonical | ubuntu_linux | 8.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "67AD11FB-529C-404E-A13B-284F145322B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCBBB7FE-35FC-4515-8393-5145339FCE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F519633F-AB68-495A-B85E-FD41F9F752CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A894BED6-C97D-4DA4-A13D-9CB2B3306BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "49A81C75-4C54-43FE-9317-E15EDFEC06B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34A847D1-5AD5-4EFD-B165-7602AFC1E656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en el controlador-balanceador en el componente mod_proxy_balancer en el servidor HTTP de Apache versi\u00f3n 2.2.x, permite a los atacantes remotos conseguir privilegios por medio de vectores no especificados." } ], "id": "CVE-2007-6420", "lastModified": "2024-11-21T00:40:06.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-12T00:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/31026" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32222" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/33797" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/34219" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3523" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27236" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/31026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/33797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/34219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3523" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Mandriva ships mod_proxy_balancer but will not be issuing updates to correct this flaw as the security risk is quite low due to the fact that is not enabled by default, the at-risk user would have to be authenticated, and successful exploitation would be limited to a denial of service on the web server.", "lastModified": "2008-03-12T00:00:00", "organization": "Mandriva" }, { "comment": "mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.\n", "lastModified": "2008-01-24T00:00:00", "organization": "Red Hat" }, { "comment": "Fixed in Apache HTTP Server 2.2.9. http://httpd.apache.org/security/vulnerabilities_22.html", "lastModified": "2008-07-02T00:00:00", "organization": "Apache" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2008_0966
Vulnerability from csaf_redhat
Published
2008-12-04 15:41
Modified
2024-11-22 02:20
Summary
Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update
Notes
Topic
Red Hat Application Stack v2.2 is now available. This update fixes several
security issues and adds various enhancements.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
[Updated 11th December 2008]
This erratum has been updated to correct a typo in the version number of
the Apache HTTP server packages mentioned in the erratum description.
The proper version of the Apache HTTP server packages shipped with this
erratum is 2.2.10. No changes have been made to the packages.
Details
The Red Hat Application Stack v2.2 is an integrated open source application
stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise
Application Platform (EAP) 4.2.
This erratum updates the Apache HTTP Server package to version 2.2.10 which
addresses the following security issues:
A flaw was found in the mod_proxy module. An attacker who has control of
a web server to which requests are being proxied could cause a limited
denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)
A flaw was found in the mod_proxy_ftp module. Where Apache is configured
to support ftp-over-httpd proxying, a remote attacker could perform a
cross-site scripting attack. (CVE-2008-2939)
A cross-site request forgery issue was found in the mod_proxy_balancer
module. A remote attacker could cause a denial of service if
mod_proxy_balancer is enabled and an authenticated user is targeted.
(CVE-2007-6420)
The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to
version 4.2.0.CP05.
The following packages were also updated:
* mysql to 5.0.60sp1
* mysql-connector-odbc to 3.51.26r1127
* perl-DBI to 1.607
* perl-DBD-MySQL to 4.008
* perl-DBD-Pg to 1.49
* php-pear to 1.7.2
* postgresql to 8.2.11
* postgresqlclient81 to 8.1.11
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Application Stack v2.2 is now available. This update fixes several\nsecurity issues and adds various enhancements.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\n[Updated 11th December 2008]\nThis erratum has been updated to correct a typo in the version number of\nthe Apache HTTP server packages mentioned in the erratum description.\nThe proper version of the Apache HTTP server packages shipped with this\nerratum is 2.2.10. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The Red Hat Application Stack v2.2 is an integrated open source application\nstack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise\nApplication Platform (EAP) 4.2.\n\nThis erratum updates the Apache HTTP Server package to version 2.2.10 which\naddresses the following security issues:\n\nA flaw was found in the mod_proxy module. An attacker who has control of\na web server to which requests are being proxied could cause a limited\ndenial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp module. Where Apache is configured\nto support ftp-over-httpd proxying, a remote attacker could perform a\ncross-site scripting attack. (CVE-2008-2939)\n\nA cross-site request forgery issue was found in the mod_proxy_balancer\nmodule. A remote attacker could cause a denial of service if\nmod_proxy_balancer is enabled and an authenticated user is targeted. \n(CVE-2007-6420)\n\nThe JBoss Enterprise Application Platform (EAP) 4.2 has been updated to\nversion 4.2.0.CP05. \n\nThe following packages were also updated:\n\n* mysql to 5.0.60sp1\n* mysql-connector-odbc to 3.51.26r1127\n* perl-DBI to 1.607\n* perl-DBD-MySQL to 4.008\n* perl-DBD-Pg to 1.49\n* php-pear to 1.7.2\n* postgresql to 8.2.11\n* postgresqlclient81 to 8.1.11", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0966", "url": "https://access.redhat.com/errata/RHSA-2008:0966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0966.json" } ], "title": "Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T02:20:41+00:00", "generator": { "date": "2024-11-22T02:20:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0966", "initial_release_date": "2008-12-04T15:41:00+00:00", "revision_history": [ { "date": "2008-12-04T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-02-24T11:07:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:20:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product": { "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:2" } } } ], "category": "product_family", "name": "Red Hat Application Stack" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.src", "product": { "name": "httpd-0:2.2.10-1.el5s2.src", "product_id": "httpd-0:2.2.10-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.src", "product": { "name": "php-pear-1:1.7.2-2.el5s2.src", "product_id": "php-pear-1:1.7.2-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product_id": "mysql-0:5.0.60sp1-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.src", "product": { "name": "postgresql-0:8.2.11-1.el5s2.src", "product_id": "postgresql-0:8.2.11-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.src", "product": { "name": "perl-DBI-0:1.607-3.el5s2.src", "product_id": "perl-DBI-0:1.607-3.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_id": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-0:2.2.10-1.el5s2.i386", "product_id": "httpd-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_id": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_id": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_id": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product": { "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product_id": "php-pear-1:1.7.2-2.el5s2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src" }, "product_reference": "httpd-0:2.2.10-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.noarch as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.noarch", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-6420", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2008-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "471009" } ], "notes": [ { "category": "description", "text": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_proxy_balancer: mod_proxy_balancer CSRF", "title": "Vulnerability summary" }, { "category": "other", "text": "mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6420" }, { "category": "external", "summary": "RHBZ#471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6420", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420" } ], "release_date": "2008-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_proxy_balancer: mod_proxy_balancer CSRF" }, { "cve": "CVE-2008-2364", "discovery_date": "2008-05-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "451615" } ], "notes": [ { "category": "description", "text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2364" }, { "category": "external", "summary": "RHBZ#451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364" } ], "release_date": "2008-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server" }, { "cve": "CVE-2008-2939", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458250" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp globbing XSS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2939" }, { "category": "external", "summary": "RHBZ#458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939" } ], "release_date": "2008-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp globbing XSS" } ] }
RHSA-2008:0966
Vulnerability from csaf_redhat
Published
2008-12-04 15:41
Modified
2024-11-22 02:20
Summary
Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update
Notes
Topic
Red Hat Application Stack v2.2 is now available. This update fixes several
security issues and adds various enhancements.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
[Updated 11th December 2008]
This erratum has been updated to correct a typo in the version number of
the Apache HTTP server packages mentioned in the erratum description.
The proper version of the Apache HTTP server packages shipped with this
erratum is 2.2.10. No changes have been made to the packages.
Details
The Red Hat Application Stack v2.2 is an integrated open source application
stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise
Application Platform (EAP) 4.2.
This erratum updates the Apache HTTP Server package to version 2.2.10 which
addresses the following security issues:
A flaw was found in the mod_proxy module. An attacker who has control of
a web server to which requests are being proxied could cause a limited
denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)
A flaw was found in the mod_proxy_ftp module. Where Apache is configured
to support ftp-over-httpd proxying, a remote attacker could perform a
cross-site scripting attack. (CVE-2008-2939)
A cross-site request forgery issue was found in the mod_proxy_balancer
module. A remote attacker could cause a denial of service if
mod_proxy_balancer is enabled and an authenticated user is targeted.
(CVE-2007-6420)
The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to
version 4.2.0.CP05.
The following packages were also updated:
* mysql to 5.0.60sp1
* mysql-connector-odbc to 3.51.26r1127
* perl-DBI to 1.607
* perl-DBD-MySQL to 4.008
* perl-DBD-Pg to 1.49
* php-pear to 1.7.2
* postgresql to 8.2.11
* postgresqlclient81 to 8.1.11
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Application Stack v2.2 is now available. This update fixes several\nsecurity issues and adds various enhancements.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\n[Updated 11th December 2008]\nThis erratum has been updated to correct a typo in the version number of\nthe Apache HTTP server packages mentioned in the erratum description.\nThe proper version of the Apache HTTP server packages shipped with this\nerratum is 2.2.10. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The Red Hat Application Stack v2.2 is an integrated open source application\nstack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise\nApplication Platform (EAP) 4.2.\n\nThis erratum updates the Apache HTTP Server package to version 2.2.10 which\naddresses the following security issues:\n\nA flaw was found in the mod_proxy module. An attacker who has control of\na web server to which requests are being proxied could cause a limited\ndenial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp module. Where Apache is configured\nto support ftp-over-httpd proxying, a remote attacker could perform a\ncross-site scripting attack. (CVE-2008-2939)\n\nA cross-site request forgery issue was found in the mod_proxy_balancer\nmodule. A remote attacker could cause a denial of service if\nmod_proxy_balancer is enabled and an authenticated user is targeted. \n(CVE-2007-6420)\n\nThe JBoss Enterprise Application Platform (EAP) 4.2 has been updated to\nversion 4.2.0.CP05. \n\nThe following packages were also updated:\n\n* mysql to 5.0.60sp1\n* mysql-connector-odbc to 3.51.26r1127\n* perl-DBI to 1.607\n* perl-DBD-MySQL to 4.008\n* perl-DBD-Pg to 1.49\n* php-pear to 1.7.2\n* postgresql to 8.2.11\n* postgresqlclient81 to 8.1.11", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0966", "url": "https://access.redhat.com/errata/RHSA-2008:0966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0966.json" } ], "title": "Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T02:20:41+00:00", "generator": { "date": "2024-11-22T02:20:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0966", "initial_release_date": "2008-12-04T15:41:00+00:00", "revision_history": [ { "date": "2008-12-04T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-02-24T11:07:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:20:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product": { "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:2" } } } ], "category": "product_family", "name": "Red Hat Application Stack" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.src", "product": { "name": "httpd-0:2.2.10-1.el5s2.src", "product_id": "httpd-0:2.2.10-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.src", "product": { "name": "php-pear-1:1.7.2-2.el5s2.src", "product_id": "php-pear-1:1.7.2-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product_id": "mysql-0:5.0.60sp1-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.src", "product": { "name": "postgresql-0:8.2.11-1.el5s2.src", "product_id": "postgresql-0:8.2.11-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.src", "product": { "name": "perl-DBI-0:1.607-3.el5s2.src", "product_id": "perl-DBI-0:1.607-3.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_id": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-0:2.2.10-1.el5s2.i386", "product_id": "httpd-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_id": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_id": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_id": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product": { "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product_id": "php-pear-1:1.7.2-2.el5s2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src" }, "product_reference": "httpd-0:2.2.10-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.noarch as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.noarch", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-6420", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2008-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "471009" } ], "notes": [ { "category": "description", "text": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_proxy_balancer: mod_proxy_balancer CSRF", "title": "Vulnerability summary" }, { "category": "other", "text": "mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6420" }, { "category": "external", "summary": "RHBZ#471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6420", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420" } ], "release_date": "2008-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_proxy_balancer: mod_proxy_balancer CSRF" }, { "cve": "CVE-2008-2364", "discovery_date": "2008-05-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "451615" } ], "notes": [ { "category": "description", "text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2364" }, { "category": "external", "summary": "RHBZ#451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364" } ], "release_date": "2008-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server" }, { "cve": "CVE-2008-2939", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458250" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp globbing XSS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2939" }, { "category": "external", "summary": "RHBZ#458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939" } ], "release_date": "2008-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp globbing XSS" } ] }
rhsa-2008:0966
Vulnerability from csaf_redhat
Published
2008-12-04 15:41
Modified
2024-11-22 02:20
Summary
Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update
Notes
Topic
Red Hat Application Stack v2.2 is now available. This update fixes several
security issues and adds various enhancements.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
[Updated 11th December 2008]
This erratum has been updated to correct a typo in the version number of
the Apache HTTP server packages mentioned in the erratum description.
The proper version of the Apache HTTP server packages shipped with this
erratum is 2.2.10. No changes have been made to the packages.
Details
The Red Hat Application Stack v2.2 is an integrated open source application
stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise
Application Platform (EAP) 4.2.
This erratum updates the Apache HTTP Server package to version 2.2.10 which
addresses the following security issues:
A flaw was found in the mod_proxy module. An attacker who has control of
a web server to which requests are being proxied could cause a limited
denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)
A flaw was found in the mod_proxy_ftp module. Where Apache is configured
to support ftp-over-httpd proxying, a remote attacker could perform a
cross-site scripting attack. (CVE-2008-2939)
A cross-site request forgery issue was found in the mod_proxy_balancer
module. A remote attacker could cause a denial of service if
mod_proxy_balancer is enabled and an authenticated user is targeted.
(CVE-2007-6420)
The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to
version 4.2.0.CP05.
The following packages were also updated:
* mysql to 5.0.60sp1
* mysql-connector-odbc to 3.51.26r1127
* perl-DBI to 1.607
* perl-DBD-MySQL to 4.008
* perl-DBD-Pg to 1.49
* php-pear to 1.7.2
* postgresql to 8.2.11
* postgresqlclient81 to 8.1.11
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Application Stack v2.2 is now available. This update fixes several\nsecurity issues and adds various enhancements.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.\n\n[Updated 11th December 2008]\nThis erratum has been updated to correct a typo in the version number of\nthe Apache HTTP server packages mentioned in the erratum description.\nThe proper version of the Apache HTTP server packages shipped with this\nerratum is 2.2.10. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The Red Hat Application Stack v2.2 is an integrated open source application\nstack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise\nApplication Platform (EAP) 4.2.\n\nThis erratum updates the Apache HTTP Server package to version 2.2.10 which\naddresses the following security issues:\n\nA flaw was found in the mod_proxy module. An attacker who has control of\na web server to which requests are being proxied could cause a limited\ndenial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)\n\nA flaw was found in the mod_proxy_ftp module. Where Apache is configured\nto support ftp-over-httpd proxying, a remote attacker could perform a\ncross-site scripting attack. (CVE-2008-2939)\n\nA cross-site request forgery issue was found in the mod_proxy_balancer\nmodule. A remote attacker could cause a denial of service if\nmod_proxy_balancer is enabled and an authenticated user is targeted. \n(CVE-2007-6420)\n\nThe JBoss Enterprise Application Platform (EAP) 4.2 has been updated to\nversion 4.2.0.CP05. \n\nThe following packages were also updated:\n\n* mysql to 5.0.60sp1\n* mysql-connector-odbc to 3.51.26r1127\n* perl-DBI to 1.607\n* perl-DBD-MySQL to 4.008\n* perl-DBD-Pg to 1.49\n* php-pear to 1.7.2\n* postgresql to 8.2.11\n* postgresqlclient81 to 8.1.11", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0966", "url": "https://access.redhat.com/errata/RHSA-2008:0966" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0966.json" } ], "title": "Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update", "tracking": { "current_release_date": "2024-11-22T02:20:41+00:00", "generator": { "date": "2024-11-22T02:20:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0966", "initial_release_date": "2008-12-04T15:41:00+00:00", "revision_history": [ { "date": "2008-12-04T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-02-24T11:07:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:20:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product": { "name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_application_stack:2" } } } ], "category": "product_family", "name": "Red Hat Application Stack" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.src", "product": { "name": "httpd-0:2.2.10-1.el5s2.src", "product_id": "httpd-0:2.2.10-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.src", "product": { "name": "php-pear-1:1.7.2-2.el5s2.src", "product_id": "php-pear-1:1.7.2-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.src", "product_id": "mysql-0:5.0.60sp1-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.src", "product": { "name": "postgresql-0:8.2.11-1.el5s2.src", "product_id": "postgresql-0:8.2.11-1.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=src" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.src", "product": { "name": "perl-DBI-0:1.607-3.el5s2.src", "product_id": "perl-DBI-0:1.607-3.el5s2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_id": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_id": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=x86_64" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_id": "perl-DBI-0:1.607-3.el5s2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-0:2.2.10-1.el5s2.i386", "product_id": "httpd-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_id": "mod_ssl-1:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.10-1.el5s2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_id": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_id": "httpd-manual-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_id": "httpd-devel-0:2.2.10-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.10-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_id": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresqlclient81-debuginfo@8.1.14-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-server@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-libs@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-devel@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-test@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-bench@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-debuginfo@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_id": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-cluster@5.0.60sp1-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_id": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mysql-connector-odbc-debuginfo@3.51.26r1127-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-test-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-test@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-tcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-devel-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-devel@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-pltcl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-contrib@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-python-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-python@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-server-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-server@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-docs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-docs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-debuginfo@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plperl@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-libs-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-libs@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_id": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/postgresql-plpython@8.2.11-1.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL-debuginfo@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_id": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-MySQL@4.008-2.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_id": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBD-Pg-debuginfo@1.49-4.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI-debuginfo@1.607-3.el5s2?arch=i386" } } }, { "category": "product_version", "name": "perl-DBI-0:1.607-3.el5s2.i386", "product": { "name": "perl-DBI-0:1.607-3.el5s2.i386", "product_id": "perl-DBI-0:1.607-3.el5s2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/perl-DBI@1.607-3.el5s2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product": { "name": "php-pear-1:1.7.2-2.el5s2.noarch", "product_id": "php-pear-1:1.7.2-2.el5s2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/php-pear@1.7.2-2.el5s2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src" }, "product_reference": "httpd-0:2.2.10-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-devel-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64" }, "product_reference": "httpd-manual-0:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.10-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64" }, "product_reference": "mod_ssl-1:2.2.10-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64" }, "product_reference": "mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64" }, "product_reference": "mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64" }, "product_reference": "perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64" }, "product_reference": "perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64" }, "product_reference": "perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.noarch as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.noarch", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "php-pear-1:1.7.2-2.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src" }, "product_reference": "php-pear-1:1.7.2-2.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-devel-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-devel-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-docs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-docs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-libs-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-libs-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-python-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-python-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-server-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-server-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresql-test-0:8.2.11-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64" }, "product_reference": "postgresql-test-0:8.2.11-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.src", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "relates_to_product_reference": "5Server-Stacks" }, { "category": "default_component_of", "full_product_name": { "name": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)", "product_id": "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" }, "product_reference": "postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64", "relates_to_product_reference": "5Server-Stacks" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-6420", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2008-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "471009" } ], "notes": [ { "category": "description", "text": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "mod_proxy_balancer: mod_proxy_balancer CSRF", "title": "Vulnerability summary" }, { "category": "other", "text": "mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6420" }, { "category": "external", "summary": "RHBZ#471009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6420", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420" } ], "release_date": "2008-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mod_proxy_balancer: mod_proxy_balancer CSRF" }, { "cve": "CVE-2008-2364", "discovery_date": "2008-05-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "451615" } ], "notes": [ { "category": "description", "text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2364" }, { "category": "external", "summary": "RHBZ#451615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364" } ], "release_date": "2008-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server" }, { "cve": "CVE-2008-2939", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "458250" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ftp globbing XSS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2939" }, { "category": "external", "summary": "RHBZ#458250", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939" } ], "release_date": "2008-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-12-04T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Server-Stacks:httpd-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.src", "5Server-Stacks:httpd-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-debuginfo-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-devel-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.i386", "5Server-Stacks:httpd-manual-0:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.i386", "5Server-Stacks:mod_ssl-1:2.2.10-1.el5s2.x86_64", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.src", "5Server-Stacks:mysql-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-bench-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-cluster-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.src", "5Server-Stacks:mysql-connector-odbc-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.i386", "5Server-Stacks:mysql-connector-odbc-debuginfo-0:3.51.26r1127-1.el5s2.x86_64", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-debuginfo-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-devel-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-libs-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-server-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.i386", "5Server-Stacks:mysql-test-0:5.0.60sp1-1.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.src", "5Server-Stacks:perl-DBD-MySQL-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.i386", "5Server-Stacks:perl-DBD-MySQL-debuginfo-0:4.008-2.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.src", "5Server-Stacks:perl-DBD-Pg-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.i386", "5Server-Stacks:perl-DBD-Pg-debuginfo-0:1.49-4.el5s2.x86_64", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.src", "5Server-Stacks:perl-DBI-0:1.607-3.el5s2.x86_64", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.i386", "5Server-Stacks:perl-DBI-debuginfo-0:1.607-3.el5s2.x86_64", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.noarch", "5Server-Stacks:php-pear-1:1.7.2-2.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.src", "5Server-Stacks:postgresql-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-contrib-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-debuginfo-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-devel-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-docs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-libs-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plperl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-plpython-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-pltcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-python-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-server-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-tcl-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.i386", "5Server-Stacks:postgresql-test-0:8.2.11-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.src", "5Server-Stacks:postgresqlclient81-0:8.1.14-1.el5s2.x86_64", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.i386", "5Server-Stacks:postgresqlclient81-debuginfo-0:8.1.14-1.el5s2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0966" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy_ftp globbing XSS" } ] }
gsd-2007-6420
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-6420", "description": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "id": "GSD-2007-6420", "references": [ "https://www.suse.com/security/cve/CVE-2007-6420.html", "https://access.redhat.com/errata/RHSA-2008:0966" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-6420" ], "details": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "id": "GSD-2007-6420", "modified": "2023-12-13T01:21:38.835709Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34219", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34219" }, { "name": "31026", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31026" }, { "name": "3523", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3523" }, { "name": "SUSE-SR:2008:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "name": "31681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "27236", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27236" }, { "name": "USN-731-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "name": "ADV-2009-0320", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "name": "32222", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32222" }, { "name": "RHSA-2008:0966", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "name": "33797", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33797" }, { "name": "20080729 rPSA-2008-0236-1 httpd mod_ssl", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "name": "20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "name": "GLSA-200807-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "HPSBUX02401", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:8371", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "name": "SSRT090005", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "67AD11FB-529C-404E-A13B-284F145322B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CCBBB7FE-35FC-4515-8393-5145339FCE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F519633F-AB68-495A-B85E-FD41F9F752CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A894BED6-C97D-4DA4-A13D-9CB2B3306BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "49A81C75-4C54-43FE-9317-E15EDFEC06B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34A847D1-5AD5-4EFD-B165-7602AFC1E656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "matchCriteriaId": "C0507E91-567A-41D6-A7E5-5088A39F75FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en el controlador-balanceador en el componente mod_proxy_balancer en el servidor HTTP de Apache versi\u00f3n 2.2.x, permite a los atacantes remotos conseguir privilegios por medio de vectores no especificados." } ], "id": "CVE-2007-6420", "lastModified": "2024-04-26T16:08:29.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-12T00:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/31026" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32222" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/33797" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/34219" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3523" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27236" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/0320" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Mandriva ships mod_proxy_balancer but will not be issuing updates to correct this flaw as the security risk is quite low due to the fact that is not enabled by default, the at-risk user would have to be authenticated, and successful exploitation would be limited to a denial of service on the web server.", "lastModified": "2008-03-12T00:00:00", "organization": "Mandriva" }, { "comment": "mod_proxy_balancer is shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack v2. We do not plan on correcting this issue as it poses a very low security risk: The balancer manager is not enabled by default, the user targeted by the CSRF would need to be authenticated, and the consequences of an exploit would be limited to a web server denial of service.\n", "lastModified": "2008-01-24T00:00:00", "organization": "Red Hat" }, { "comment": "Fixed in Apache HTTP Server 2.2.9. http://httpd.apache.org/security/vulnerabilities_22.html", "lastModified": "2008-07-02T00:00:00", "organization": "Apache" } ], "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-6p65-8p9q-94p9
Vulnerability from github
Published
2022-05-01 18:42
Modified
2024-04-26 18:33
Details
Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
{ "affected": [], "aliases": [ "CVE-2007-6420" ], "database_specific": { "cwe_ids": [ "CWE-352" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-01-12T00:46:00Z", "severity": "MODERATE" }, "details": "Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.", "id": "GHSA-6p65-8p9q-94p9", "modified": "2024-04-26T18:33:40Z", "published": "2022-05-01T18:42:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6420" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8371" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=123376588623823\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/31026" }, { "type": "WEB", "url": "http://secunia.com/advisories/32222" }, { "type": "WEB", "url": "http://secunia.com/advisories/33797" }, { "type": "WEB", "url": "http://secunia.com/advisories/34219" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200807-06.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3523" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3216" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0966.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/486169/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/494858/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27236" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/31681" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-731-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0320" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.