{"id":"RHSA-2006:0578","summary":"Red Hat Security Advisory: seamonkey security update (was mozilla)","modified":"2026-03-11T06:01:21.249919Z","published":"2024-09-15T16:17:55Z","upstream":["CVE-2006-2776","CVE-2006-2778","CVE-2006-2779","CVE-2006-2780","CVE-2006-2781","CVE-2006-2782","CVE-2006-2783","CVE-2006-2784","CVE-2006-2785","CVE-2006-2786","CVE-2006-2787","CVE-2006-2788"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"type":"ARTICLE","url":"http://www.redhat.com/security/updates/classification/#critical"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=196971"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=198683"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0578.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2776"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618112"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2776"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2776"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618113"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2778"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2778"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2779"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618114"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2779"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2780"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618115"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2780"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2781"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=193963"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2781"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2782"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618116"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2782"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2782"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2783"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618117"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2783"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2784"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618118"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2784"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2784"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2785"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618119"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2785"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2785"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2786"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618120"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2786"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618121"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2787"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2787"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2006-2788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618122"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2006-2788"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2788"}],"affected":[{"package":{"name":"seamonkey","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-chat","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-chat"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-debuginfo","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-devel","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-dom-inspector","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-dom-inspector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-js-debugger","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-js-debugger"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-mail","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-mail"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-nspr"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr-devel","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-nspr-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss-devel","ecosystem":"Red Hat:enterprise_linux:3::as","purl":"pkg:rpm/redhat/seamonkey-nss-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-chat","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-chat"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-debuginfo","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-devel","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-dom-inspector","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-dom-inspector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-js-debugger","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-js-debugger"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-mail","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-mail"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-nspr"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr-devel","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-nspr-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss-devel","ecosystem":"Red Hat:enterprise_linux:3::desktop","purl":"pkg:rpm/redhat/seamonkey-nss-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-chat","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-chat"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-debuginfo","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-devel","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-dom-inspector","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-dom-inspector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-js-debugger","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-js-debugger"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-mail","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-mail"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-nspr"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr-devel","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-nspr-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss-devel","ecosystem":"Red Hat:enterprise_linux:3::es","purl":"pkg:rpm/redhat/seamonkey-nss-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-chat","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-chat"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-debuginfo","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-devel","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-dom-inspector","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-dom-inspector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-js-debugger","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-js-debugger"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-mail","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-mail"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-nspr"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nspr-devel","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-nspr-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-nss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}},{"package":{"name":"seamonkey-nss-devel","ecosystem":"Red Hat:enterprise_linux:3::ws","purl":"pkg:rpm/redhat/seamonkey-nss-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.2-0.1.0.EL3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2006:0578.json"}}],"schema_version":"1.7.5"}