U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-2409

Change History

Modified Analysis by NIST 3/27/2025 10:01:31 AM

Action Type Old Value New Value
Added CWE

								
							
							
						
CWE-295
Removed CWE
CWE-310

								
						
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* versions up to (excluding) 3.12.3
          *cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.4
          *cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* versions from (including) 2.7.0 up to (excluding) 2.7.4
          *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 0.9.8 up to (including) 0.9.8k
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
     OR
          *cpe:2.3:a:mozilla:nss:3.4.3:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.12:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.11.2:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.4:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.9:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7.7:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.11.8:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7.5:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.6:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.5:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.4.2:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.4.1:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.10:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.9.5:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.8:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7.3:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7.2:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.7.1:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.11.4:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:*:*:*:*:*:*:*:* versions up to (including) 3.12.2
          *cpe:2.3:a:mozilla:nss:3.11.7:*:*:*:*:*:*:*
          *cpe:2.3:a:mozilla:nss:3.12.1:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
OR
          *cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.8:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.14:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.11:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.21:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.11:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.20:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.24:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.15:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:* versions up to (including) 2.6.3
          *cpe:2.3:a:gnu:gnutls:1.7.8:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.16:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.18:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.20:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.10:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.22:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.6.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.13:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.19:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.18:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.9:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.10:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.13:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.8.1a1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.19:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.18:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.7:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.15:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.14:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.23:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.6:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.2.9:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.17:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.7:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.6:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.1:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.5.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.16:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.7.12:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.16:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.0.22:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.6.2:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.4.4:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.1.17:*:*:*:*:*:*:*
          *cpe:2.3:a:gnu:gnutls:1.3.3:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
OR
          *cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*

								
						
Changed Reference Type
CVE: http://secunia.com/advisories/36739 Types: Vendor Advisory
CVE: http://secunia.com/advisories/36739 Types: Not Applicable
Changed Reference Type
CVE: http://secunia.com/advisories/37386 Types: Vendor Advisory
CVE: http://secunia.com/advisories/37386 Types: Not Applicable
Changed Reference Type
CVE: http://secunia.com/advisories/42467 Types: Vendor Advisory
CVE: http://secunia.com/advisories/42467 Types: Not Applicable
Changed Reference Type
Red Hat, Inc.: http://secunia.com/advisories/36739 Types: Vendor Advisory
Red Hat, Inc.: http://secunia.com/advisories/36739 Types: Not Applicable
Changed Reference Type
Red Hat, Inc.: http://secunia.com/advisories/37386 Types: Vendor Advisory
Red Hat, Inc.: http://secunia.com/advisories/37386 Types: Not Applicable
Changed Reference Type
Red Hat, Inc.: http://secunia.com/advisories/42467 Types: Vendor Advisory
Red Hat, Inc.: http://secunia.com/advisories/42467 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://java.sun.com/javase/6/webnotes/6u17.html Types: Release Notes
Added Reference Type

								
							
							
						
CVE: http://secunia.com/advisories/36669 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://security.gentoo.org/glsa/glsa-200911-02.xml Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://security.gentoo.org/glsa/glsa-200912-01.xml Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://support.apple.com/kb/HT3937 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://www.debian.org/security/2009/dsa-1874 Types: Mailing List
Added Reference Type

								
							
							
						
CVE: http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://www.mandriva.com/security/advisories?name=MDVSA-2009:258 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 Types: Not Applicable
Added Reference Type

								
							
							
						
CVE: http://www.redhat.com/support/errata/RHSA-2009-1207.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.redhat.com/support/errata/RHSA-2009-1432.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.securityfocus.com/archive/1/515055/100/0/threaded Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://www.securitytracker.com/id?1022631 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://www.ubuntu.com/usn/usn-810-1 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.vmware.com/security/advisories/VMSA-2010-0019.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://rhn.redhat.com/errata/RHSA-2010-0095.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://usn.ubuntu.com/810-2/ Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://www.debian.org/security/2009/dsa-1888 Types: Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://java.sun.com/javase/6/webnotes/6u17.html Types: Release Notes
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://secunia.com/advisories/36669 Types: Not Applicable
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://security.gentoo.org/glsa/glsa-200911-02.xml Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://security.gentoo.org/glsa/glsa-200912-01.xml Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://support.apple.com/kb/HT3937 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.debian.org/security/2009/dsa-1874 Types: Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.mandriva.com/security/advisories?name=MDVSA-2009:197 Types: Not Applicable
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 Types: Not Applicable
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.mandriva.com/security/advisories?name=MDVSA-2009:258 Types: Not Applicable
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 Types: Not Applicable
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.redhat.com/support/errata/RHSA-2009-1207.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.redhat.com/support/errata/RHSA-2009-1432.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.securityfocus.com/archive/1/515055/100/0/threaded Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.securitytracker.com/id?1022631 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.ubuntu.com/usn/usn-810-1 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.vmware.com/security/advisories/VMSA-2010-0019.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2409 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10763 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6631 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7155 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8594 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://rhn.redhat.com/errata/RHSA-2010-0095.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://usn.ubuntu.com/810-2/ Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://www.debian.org/security/2009/dsa-1888 Types: Mailing List, Third Party Advisory