Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4242 (GCVE-0-2013-4242)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:38:01.611Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "DSA-2731",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"name": "54332",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54332"
},
{
"name": "54321",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54321"
},
{
"name": "54375",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54375"
},
{
"name": "openSUSE-SU-2013:1294",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"name": "61464",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/61464"
},
{
"name": "USN-1923-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://eprint.iacr.org/2013/448"
},
{
"name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"name": "VU#976534",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"name": "DSA-2730",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"name": "RHSA-2013:1457",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "54318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/54318"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-07-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-06T18:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "DSA-2731",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"name": "54332",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54332"
},
{
"name": "54321",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54321"
},
{
"name": "54375",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54375"
},
{
"name": "openSUSE-SU-2013:1294",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"name": "61464",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/61464"
},
{
"name": "USN-1923-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://eprint.iacr.org/2013/448"
},
{
"name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"name": "VU#976534",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"name": "DSA-2730",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"name": "RHSA-2013:1457",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "54318",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/54318"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4242",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "DSA-2731",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"name": "54332",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54332"
},
{
"name": "54321",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54321"
},
{
"name": "54375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54375"
},
{
"name": "openSUSE-SU-2013:1294",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"name": "61464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61464"
},
{
"name": "USN-1923-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"name": "http://eprint.iacr.org/2013/448",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2013/448"
},
{
"name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"name": "VU#976534",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"name": "DSA-2730",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"name": "RHSA-2013:1457",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "54318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54318"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4242",
"datePublished": "2013-08-19T23:00:00",
"dateReserved": "2013-06-12T00:00:00",
"dateUpdated": "2024-08-06T16:38:01.611Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4242\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-19T23:55:09.010\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.\"},{\"lang\":\"es\",\"value\":\"GnuPG anterior a 1.4.14, y Libgcrypt anterior a 1.5.3 usado en GnuPG 2.0.x y posiblemente otros productos, permite a usuarios locales obtener las claves RSA privadas a trav\u00e9s de un ataque \\\"side-channel\\\" que involucra la cach\u00e9 L3. Aka Flush+Reload.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"7118F616-25CA-4E34-AA13-4D14BB62419F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAA48D9-BEB4-4E49-AD50-325C262D46D9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.13\",\"matchCriteriaId\":\"8E452421-0CC6-4881-85CE-5FF790E15DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B63BBB3-F0A3-4532-9B9B-F0B0D4D27505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C80D00C-A701-4427-9AF8-1EB9B489C809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE5E43F-D03A-4B24-AB9E-D3F58B4CBB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FC4CD4-AF40-4578-A002-CB581248C17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BACBFCFE-B342-4F0A-86DE-834D9F67C72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D961679E-B916-47EE-8E06-5B1900AA80DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE91418D-A558-4352-8492-4061D1595E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7649D9A0-5D17-40CB-ACCF-4E6D52E448D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249C32C0-6C36-4CE4-93EC-70DBF4F81F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEF1CF5-A808-4D81-9249-6931C0FBFA0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C752031B-9B93-4AD7-AA78-C1F6681355A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06E3DEC-4E24-4A72-A673-7B7021F66AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FE144C-7F47-4272-A382-4A3061FBE278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3DA8C4-7498-4931-9DD6-A288F7B79C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A51DD2D8-0BE3-420B-9C6B-4AC995758235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46660CA2-1403-47C9-8295-4099609409E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A133DA9B-41D7-434D-A4EF-903FAA4553D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66FC455C-1F58-4C6C-B7DE-B18507A3F29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545C62E1-89C8-440B-A472-63040465C9F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52469668-39AB-4953-AC80-15F47F5AAD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD2F511-F515-4733-8B3E-C0721E5D07A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2468BF42-3D18-4D3C-97F6-427257E36BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6B2A1B-E862-4429-918C-C412FDB6CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81CFDA3-6B39-4559-AA67-E006074E610E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466E18ED-338E-42F2-AD4C-107138DB9454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E211E1C-BC8B-463B-816F-E2AAEE02A70F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FC73F7-E75C-482E-9C44-F85B2B5A46F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FEB19C-810C-48FD-A10A-B4A11767CA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2E96E1-9E1C-4F7E-9902-F2290B204CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6863306-F7B8-47D9-8FF9-4340FC6D718F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA95D254-1D85-4523-9DF2-8A07BF05573E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E24FB9C-1CA9-4A1B-8AF6-06B3C1865EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07D0653-4538-47D8-AB8F-0A23D65F0AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E18355-65AF-4DB4-B6B2-431D7788FF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*\",\"matchCriteriaId\":\"0E61804F-21BA-4850-B859-D69C80F37FFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C40692-FE9F-48D6-9AEB-5F35FA369980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*\",\"matchCriteriaId\":\"585F51C8-2FDC-46CE-9F71-ED9EE2ADA472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18395DAB-24DA-4ABD-ABD8-38A49417B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6228E3FF-5EB4-4F46-9EA8-1B114947994D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96DEF388-2B09-4212-8AF5-9FE54CCAFEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A798490-741B-4EB4-B1D9-353A181A7AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*\",\"matchCriteriaId\":\"F781A379-57DF-4D1E-8B85-4FD637E4B967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8466E9BD-5623-40EE-A604-0F29C3520B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E98B61C-7093-4251-B1D8-59B647C2DF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F9FCAC0-08D1-4044-A506-4AC14BF381CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545E4C50-229D-4B27-9DB2-9D1204451A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50A16A8-9C96-47CB-B18B-AE79C754ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08877372-B7DD-4543-84A8-C40D2BA100F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7135BE6C-E797-4C41-BCD5-161DC7561433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E909F1D4-AFB1-43F3-9635-E318D64099B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4AAE4C-3F59-46D3-A38E-CC5DFCBEC3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"688CDCA9-2809-4C0E-9DBC-133F48D56BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"564B521B-3C7C-46CF-94E8-A368AF81DA54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC04BFA0-C7B0-4F70-9676-8156C9CE18AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F43CE80-06BC-4448-9033-F2F88663C527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7181202-BC32-4F1E-9EF8-F544CCDA1671\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F55827F8-CC36-45DA-8F9E-1F520911EB12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEAA5DF-33D1-4D4A-BA01-4BC863DBC272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28374619-966D-4F38-B83E-A6296F27CC05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB20A34-5E11-4D70-B3DE-66DD9863AE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA47467D-3D96-46DB-B0AC-D28586829710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B68F2F-0718-4C87-9629-4657DC49EECC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C14D838-595F-4D1C-88B9-073937316923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF8F2C7-574C-4768-ABAA-E3D9236299CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113D566B-B596-4612-9D11-E238602A603E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFC52C5-1148-4AC6-AAA2-8343E0C2029E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07E370B-4D2E-4EEC-A3EB-47AA9283278D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3C52E7-454B-4FE9-9068-87ACB2925A5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B62D8E-3A37-4D7A-B674-06FFD80B86FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D27E52-B850-4BC0-B81A-A031BC50514B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0035132-40B2-4C7E-B6E3-F70117F3FC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2D7B2D-CEBC-42BA-90E0-5C71BA39F5BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0626EEB2-39B3-4154-9F99-027057B33D1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752E350F-E1EB-47CE-95E7-F990F4453BF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F223B411-B9A6-49D4-A9BA-4FBF74B85A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9C4712-169A-4010-B143-98690803E5BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E76177-9B90-40F2-AB9D-7C7249DEC497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A384E132-188E-40AC-84C9-D46A589EE766\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BE1F8C-EE11-4E9B-9745-037F3AC7CC63\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.2\",\"matchCriteriaId\":\"C7877BAA-8058-465F-AF8A-C1F4BFC84E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"128317AB-E441-47E3-BE5C-86C0D9C267E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7509E7-9DF3-42AC-A538-A1BE675253BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAFA68DC-FFA3-4538-8082-93588CCB44D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEEF3D2-57D5-4E33-8856-B7A859ADD453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E283C1-F1AE-4D29-A683-B5C5503133EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7AEF669-B7AA-425A-988A-9F858937EC76\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://eprint.iacr.org/2013/448\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1457.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/54318\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54321\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54332\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2730\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2731\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/976534\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/61464\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1923-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://eprint.iacr.org/2013/448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1457.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/54318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/976534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/61464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1923-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"initial_release_date": "2015-10-15T00:00:00",
"last_revision_date": "2015-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2014-AVI-244
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Solaris 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4286"
},
{
"name": "CVE-2013-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0200"
},
{
"name": "CVE-2013-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4590"
},
{
"name": "CVE-2013-6712",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6712"
},
{
"name": "CVE-2013-6420",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6420"
},
{
"name": "CVE-2013-1571",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1571"
},
{
"name": "CVE-2012-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4037"
},
{
"name": "CVE-2006-4810",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4810"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2010-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0205"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2013-4248",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4248"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2014-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1943"
},
{
"name": "CVE-2014-2281",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2281"
},
{
"name": "CVE-2013-4496",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4496"
},
{
"name": "CVE-2013-4322",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4322"
},
{
"name": "CVE-2013-5211",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5211"
},
{
"name": "CVE-2014-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0033"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2014-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2283"
},
{
"name": "CVE-2013-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6438"
},
{
"name": "CVE-2014-2270",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2270"
},
{
"name": "CVE-2013-4238",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4238"
},
{
"name": "CVE-2014-1912",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1912"
},
{
"name": "CVE-2014-2282",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2282"
}
],
"initial_release_date": "2014-05-27T00:00:00",
"last_revision_date": "2014-05-27T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-244",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-05-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Certaines d\u0027entre elles permettent\n\u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 22 mai 2014",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
rhsa-2013_1457
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1457",
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json"
}
],
"title": "Red Hat Security Advisory: libgcrypt security update",
"tracking": {
"current_release_date": "2024-11-22T07:13:23+00:00",
"generator": {
"date": "2024-11-22T07:13:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1457",
"initial_release_date": "2013-10-24T15:18:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:23:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T07:13:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:18:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
}
]
}
rhsa-2013:1458
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1458",
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json"
}
],
"title": "Red Hat Security Advisory: gnupg security update",
"tracking": {
"current_release_date": "2025-10-09T14:22:40+00:00",
"generator": {
"date": "2025-10-09T14:22:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1458",
"initial_release_date": "2013-10-24T15:16:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:22:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:22:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product_id": "gnupg-0:1.4.5-18.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2012-12-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "891142"
}
],
"notes": [
{
"category": "description",
"text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: read_block() corrupt key input validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6085"
},
{
"category": "external",
"summary": "RHBZ#891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085"
}
],
"release_date": "2012-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "GnuPG: read_block() corrupt key input validation"
},
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
},
{
"cve": "CVE-2013-4351",
"discovery_date": "2013-09-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1010137"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnupg: treats no-usage-permitted keys as all-usages-permitted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4351"
},
{
"category": "external",
"summary": "RHBZ#1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351"
}
],
"release_date": "2013-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "gnupg: treats no-usage-permitted keys as all-usages-permitted"
},
{
"acknowledgments": [
{
"names": [
"Werner Koch"
]
},
{
"names": [
"Taylor R Campbell"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4402",
"discovery_date": "2013-10-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1015685"
}
],
"notes": [
{
"category": "description",
"text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: infinite recursion in the compressed packet parser DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4402"
},
{
"category": "external",
"summary": "RHBZ#1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402"
}
],
"release_date": "2013-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG: infinite recursion in the compressed packet parser DoS"
}
]
}
rhsa-2013:1457
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1457",
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json"
}
],
"title": "Red Hat Security Advisory: libgcrypt security update",
"tracking": {
"current_release_date": "2025-10-09T15:01:14+00:00",
"generator": {
"date": "2025-10-09T15:01:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1457",
"initial_release_date": "2013-10-24T15:18:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:23:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T15:01:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:18:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
}
]
}
RHSA-2013:1457
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1457",
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json"
}
],
"title": "Red Hat Security Advisory: libgcrypt security update",
"tracking": {
"current_release_date": "2025-10-09T15:01:14+00:00",
"generator": {
"date": "2025-10-09T15:01:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1457",
"initial_release_date": "2013-10-24T15:18:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:18:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:23:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T15:01:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.src",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
},
"product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:18:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1457"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src",
"5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x",
"5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src",
"6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x",
"6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
}
]
}
rhsa-2013_1458
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1458",
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json"
}
],
"title": "Red Hat Security Advisory: gnupg security update",
"tracking": {
"current_release_date": "2024-11-22T07:13:28+00:00",
"generator": {
"date": "2024-11-22T07:13:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1458",
"initial_release_date": "2013-10-24T15:16:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:22:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T07:13:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product_id": "gnupg-0:1.4.5-18.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2012-12-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "891142"
}
],
"notes": [
{
"category": "description",
"text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: read_block() corrupt key input validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6085"
},
{
"category": "external",
"summary": "RHBZ#891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085"
}
],
"release_date": "2012-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "GnuPG: read_block() corrupt key input validation"
},
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
},
{
"cve": "CVE-2013-4351",
"discovery_date": "2013-09-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1010137"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnupg: treats no-usage-permitted keys as all-usages-permitted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4351"
},
{
"category": "external",
"summary": "RHBZ#1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351"
}
],
"release_date": "2013-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "gnupg: treats no-usage-permitted keys as all-usages-permitted"
},
{
"acknowledgments": [
{
"names": [
"Werner Koch"
]
},
{
"names": [
"Taylor R Campbell"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4402",
"discovery_date": "2013-10-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1015685"
}
],
"notes": [
{
"category": "description",
"text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: infinite recursion in the compressed packet parser DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4402"
},
{
"category": "external",
"summary": "RHBZ#1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402"
}
],
"release_date": "2013-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG: infinite recursion in the compressed packet parser DoS"
}
]
}
RHSA-2013:1458
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1458",
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json"
}
],
"title": "Red Hat Security Advisory: gnupg security update",
"tracking": {
"current_release_date": "2025-10-09T14:22:40+00:00",
"generator": {
"date": "2025-10-09T14:22:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2013:1458",
"initial_release_date": "2013-10-24T15:16:00+00:00",
"revision_history": [
{
"date": "2013-10-24T15:16:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-10-24T15:22:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T14:22:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.src",
"product_id": "gnupg-0:1.4.5-18.el5_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Client-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.src",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"relates_to_product_reference": "5Server-5.10.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
},
"product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"relates_to_product_reference": "5Server-5.10.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6085",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2012-12-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "891142"
}
],
"notes": [
{
"category": "description",
"text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: read_block() corrupt key input validation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6085"
},
{
"category": "external",
"summary": "RHBZ#891142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6085"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085"
}
],
"release_date": "2012-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "GnuPG: read_block() corrupt key input validation"
},
{
"cve": "CVE-2013-4242",
"discovery_date": "2013-07-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "988589"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "RHBZ#988589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"category": "external",
"summary": "http://eprint.iacr.org/2013/448",
"url": "http://eprint.iacr.org/2013/448"
}
],
"release_date": "2013-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack"
},
{
"cve": "CVE-2013-4351",
"discovery_date": "2013-09-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1010137"
}
],
"notes": [
{
"category": "description",
"text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnupg: treats no-usage-permitted keys as all-usages-permitted",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4351"
},
{
"category": "external",
"summary": "RHBZ#1010137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4351"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351"
}
],
"release_date": "2013-03-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "gnupg: treats no-usage-permitted keys as all-usages-permitted"
},
{
"acknowledgments": [
{
"names": [
"Werner Koch"
]
},
{
"names": [
"Taylor R Campbell"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4402",
"discovery_date": "2013-10-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1015685"
}
],
"notes": [
{
"category": "description",
"text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GnuPG: infinite recursion in the compressed packet parser DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4402"
},
{
"category": "external",
"summary": "RHBZ#1015685",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4402"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402"
}
],
"release_date": "2013-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-10-24T15:16:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258",
"product_ids": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1458"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src",
"5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x",
"5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GnuPG: infinite recursion in the compressed packet parser DoS"
}
]
}
gsd-2013-4242
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2013-4242",
"description": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"id": "GSD-2013-4242",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4242.html",
"https://www.debian.org/security/2013/dsa-2731",
"https://www.debian.org/security/2013/dsa-2730",
"https://access.redhat.com/errata/RHSA-2013:1458",
"https://access.redhat.com/errata/RHSA-2013:1457",
"https://advisories.mageia.org/CVE-2013-4242.html",
"https://alas.aws.amazon.com/cve/html/CVE-2013-4242.html",
"https://linux.oracle.com/cve/CVE-2013-4242.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-4242"
],
"details": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"id": "GSD-2013-4242",
"modified": "2023-12-13T01:22:16.747442Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4242",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "DSA-2731",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"name": "54332",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54332"
},
{
"name": "54321",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54321"
},
{
"name": "54375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54375"
},
{
"name": "openSUSE-SU-2013:1294",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"name": "61464",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/61464"
},
{
"name": "USN-1923-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"name": "http://eprint.iacr.org/2013/448",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2013/448"
},
{
"name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released",
"refsource": "MLIST",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"name": "VU#976534",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"name": "DSA-2730",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"name": "RHSA-2013:1457",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "54318",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54318"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.4.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4242"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://eprint.iacr.org/2013/448",
"refsource": "MISC",
"tags": [],
"url": "http://eprint.iacr.org/2013/448"
},
{
"name": "openSUSE-SU-2013:1294",
"refsource": "SUSE",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"name": "54318",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54318"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880",
"refsource": "MISC",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"name": "54375",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54375"
},
{
"name": "54332",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54332"
},
{
"name": "DSA-2731",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"name": "USN-1923-1",
"refsource": "UBUNTU",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"name": "61464",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/61464"
},
{
"name": "DSA-2730",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"name": "54321",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54321"
},
{
"name": "VU#976534",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"name": "RHSA-2013:1457",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-30T16:27Z",
"publishedDate": "2013-08-19T23:55Z"
}
}
}
opensuse-su-2024:10037-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libgcrypt-cavs-1.7.3-1.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libgcrypt-cavs-1.7.3-1.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10037",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10037-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4242 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4242/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3591 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0837 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5738 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7511 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6313/"
}
],
"title": "libgcrypt-cavs-1.7.3-1.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10037-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt-cavs-1.7.3-1.3.aarch64",
"product_id": "libgcrypt-cavs-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt-devel-1.7.3-1.3.aarch64",
"product_id": "libgcrypt-devel-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"product_id": "libgcrypt-devel-32bit-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt20-1.7.3-1.3.aarch64",
"product_id": "libgcrypt20-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt20-32bit-1.7.3-1.3.aarch64",
"product_id": "libgcrypt20-32bit-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt20-hmac-1.7.3-1.3.aarch64",
"product_id": "libgcrypt20-hmac-1.7.3-1.3.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"product": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"product_id": "libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt-cavs-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt-cavs-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt-devel-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt-devel-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt-devel-32bit-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt20-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt20-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt20-32bit-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt20-hmac-1.7.3-1.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"product": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"product_id": "libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt-cavs-1.7.3-1.3.s390x",
"product_id": "libgcrypt-cavs-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt-devel-1.7.3-1.3.s390x",
"product_id": "libgcrypt-devel-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"product_id": "libgcrypt-devel-32bit-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt20-1.7.3-1.3.s390x",
"product_id": "libgcrypt20-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt20-32bit-1.7.3-1.3.s390x",
"product_id": "libgcrypt20-32bit-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt20-hmac-1.7.3-1.3.s390x",
"product_id": "libgcrypt20-hmac-1.7.3-1.3.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"product": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"product_id": "libgcrypt20-hmac-32bit-1.7.3-1.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt-cavs-1.7.3-1.3.x86_64",
"product_id": "libgcrypt-cavs-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt-devel-1.7.3-1.3.x86_64",
"product_id": "libgcrypt-devel-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"product_id": "libgcrypt-devel-32bit-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt20-1.7.3-1.3.x86_64",
"product_id": "libgcrypt20-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt20-32bit-1.7.3-1.3.x86_64",
"product_id": "libgcrypt20-32bit-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt20-hmac-1.7.3-1.3.x86_64",
"product_id": "libgcrypt20-hmac-1.7.3-1.3.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64",
"product": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64",
"product_id": "libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt-cavs-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt-cavs-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt-cavs-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt-cavs-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt-devel-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt-devel-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt-devel-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt-devel-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt20-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt20-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt20-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt20-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt20-32bit-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt20-32bit-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt20-32bit-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt20-hmac-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt20-hmac-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt20-hmac-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64"
},
"product_reference": "libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le"
},
"product_reference": "libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x"
},
"product_reference": "libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
},
"product_reference": "libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4242",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4242"
}
],
"notes": [
{
"category": "general",
"text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4242",
"url": "https://www.suse.com/security/cve/CVE-2013-4242"
},
{
"category": "external",
"summary": "SUSE Bug 831359 for CVE-2013-4242",
"url": "https://bugzilla.suse.com/831359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4242"
},
{
"cve": "CVE-2014-3591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3591"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server\u0027s private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3591",
"url": "https://www.suse.com/security/cve/CVE-2014-3591"
},
{
"category": "external",
"summary": "SUSE Bug 920057 for CVE-2014-3591",
"url": "https://bugzilla.suse.com/920057"
},
{
"category": "external",
"summary": "SUSE Bug 949135 for CVE-2014-3591",
"url": "https://bugzilla.suse.com/949135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-3591"
},
{
"cve": "CVE-2015-0837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0837"
}
],
"notes": [
{
"category": "general",
"text": "The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a \"Last-Level Cache Side-Channel Attack.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0837",
"url": "https://www.suse.com/security/cve/CVE-2015-0837"
},
{
"category": "external",
"summary": "SUSE Bug 920057 for CVE-2015-0837",
"url": "https://bugzilla.suse.com/920057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-0837"
},
{
"cve": "CVE-2015-5738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5738"
}
],
"notes": [
{
"category": "general",
"text": "The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5738",
"url": "https://www.suse.com/security/cve/CVE-2015-5738"
},
{
"category": "external",
"summary": "SUSE Bug 944456 for CVE-2015-5738",
"url": "https://bugzilla.suse.com/944456"
},
{
"category": "external",
"summary": "SUSE Bug 944835 for CVE-2015-5738",
"url": "https://bugzilla.suse.com/944835"
},
{
"category": "external",
"summary": "SUSE Bug 944836 for CVE-2015-5738",
"url": "https://bugzilla.suse.com/944836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-5738"
},
{
"cve": "CVE-2015-7511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7511"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7511",
"url": "https://www.suse.com/security/cve/CVE-2015-7511"
},
{
"category": "external",
"summary": "SUSE Bug 965902 for CVE-2015-7511",
"url": "https://bugzilla.suse.com/965902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-7511"
},
{
"cve": "CVE-2016-6313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6313"
}
],
"notes": [
{
"category": "general",
"text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6313",
"url": "https://www.suse.com/security/cve/CVE-2016-6313"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/1123792"
},
{
"category": "external",
"summary": "SUSE Bug 994157 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/994157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.7.3-1.3.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.7.3-1.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-6313"
}
]
}
ghsa-rpp2-q7rq-p78j
Vulnerability from github
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
{
"affected": [],
"aliases": [
"CVE-2013-4242"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-08-19T23:55:00Z",
"severity": "LOW"
},
"details": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.",
"id": "GHSA-rpp2-q7rq-p78j",
"modified": "2022-05-14T02:10:40Z",
"published": "2022-05-14T02:10:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"type": "WEB",
"url": "http://eprint.iacr.org/2013/448"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"type": "WEB",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/54318"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/54321"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/54332"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/54375"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/61464"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1923-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
fkie_cve-2013-4242
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880 | ||
| secalert@redhat.com | http://eprint.iacr.org/2013/448 | ||
| secalert@redhat.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| secalert@redhat.com | http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html | Vendor Advisory | |
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-1457.html | ||
| secalert@redhat.com | http://secunia.com/advisories/54318 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/54321 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/54332 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/54375 | Vendor Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2013/dsa-2730 | ||
| secalert@redhat.com | http://www.debian.org/security/2013/dsa-2731 | ||
| secalert@redhat.com | http://www.kb.cert.org/vuls/id/976534 | US Government Resource | |
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/61464 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1923-1 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://eprint.iacr.org/2013/448 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1457.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/54318 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/54321 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/54332 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/54375 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2730 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2731 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/976534 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/61464 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1923-1 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 12.10 | |
| canonical | ubuntu_linux | 13.04 | |
| debian | debian_linux | 6.0 | |
| debian | debian_linux | 7.0 | |
| gnupg | gnupg | * | |
| gnupg | gnupg | 0.0.0 | |
| gnupg | gnupg | 0.2.15 | |
| gnupg | gnupg | 0.2.16 | |
| gnupg | gnupg | 0.2.17 | |
| gnupg | gnupg | 0.2.18 | |
| gnupg | gnupg | 0.2.19 | |
| gnupg | gnupg | 0.3.0 | |
| gnupg | gnupg | 0.3.1 | |
| gnupg | gnupg | 0.3.2 | |
| gnupg | gnupg | 0.3.3 | |
| gnupg | gnupg | 0.3.4 | |
| gnupg | gnupg | 0.3.5 | |
| gnupg | gnupg | 0.4.0 | |
| gnupg | gnupg | 0.4.1 | |
| gnupg | gnupg | 0.4.3 | |
| gnupg | gnupg | 0.4.4 | |
| gnupg | gnupg | 0.4.5 | |
| gnupg | gnupg | 0.9.0 | |
| gnupg | gnupg | 0.9.1 | |
| gnupg | gnupg | 0.9.2 | |
| gnupg | gnupg | 0.9.3 | |
| gnupg | gnupg | 0.9.4 | |
| gnupg | gnupg | 0.9.5 | |
| gnupg | gnupg | 0.9.6 | |
| gnupg | gnupg | 0.9.7 | |
| gnupg | gnupg | 0.9.8 | |
| gnupg | gnupg | 0.9.9 | |
| gnupg | gnupg | 0.9.10 | |
| gnupg | gnupg | 0.9.11 | |
| gnupg | gnupg | 1.0.0 | |
| gnupg | gnupg | 1.0.1 | |
| gnupg | gnupg | 1.0.2 | |
| gnupg | gnupg | 1.0.3 | |
| gnupg | gnupg | 1.0.4 | |
| gnupg | gnupg | 1.0.4 | |
| gnupg | gnupg | 1.0.5 | |
| gnupg | gnupg | 1.0.5 | |
| gnupg | gnupg | 1.0.6 | |
| gnupg | gnupg | 1.0.7 | |
| gnupg | gnupg | 1.2.0 | |
| gnupg | gnupg | 1.2.1 | |
| gnupg | gnupg | 1.2.1 | |
| gnupg | gnupg | 1.2.2 | |
| gnupg | gnupg | 1.2.3 | |
| gnupg | gnupg | 1.2.4 | |
| gnupg | gnupg | 1.2.5 | |
| gnupg | gnupg | 1.2.6 | |
| gnupg | gnupg | 1.2.7 | |
| gnupg | gnupg | 1.3.0 | |
| gnupg | gnupg | 1.3.1 | |
| gnupg | gnupg | 1.3.2 | |
| gnupg | gnupg | 1.3.3 | |
| gnupg | gnupg | 1.3.4 | |
| gnupg | gnupg | 1.3.6 | |
| gnupg | gnupg | 1.3.90 | |
| gnupg | gnupg | 1.3.91 | |
| gnupg | gnupg | 1.3.92 | |
| gnupg | gnupg | 1.3.93 | |
| gnupg | gnupg | 1.4.0 | |
| gnupg | gnupg | 1.4.10 | |
| gnupg | gnupg | 1.4.11 | |
| gnupg | gnupg | 1.4.12 | |
| gnupg | gnupg | 2.0.1 | |
| gnupg | gnupg | 2.0.3 | |
| gnupg | gnupg | 2.0.4 | |
| gnupg | gnupg | 2.0.5 | |
| gnupg | gnupg | 2.0.6 | |
| gnupg | gnupg | 2.0.7 | |
| gnupg | gnupg | 2.0.8 | |
| gnupg | gnupg | 2.0.10 | |
| gnupg | gnupg | 2.0.11 | |
| gnupg | gnupg | 2.0.12 | |
| gnupg | gnupg | 2.0.13 | |
| gnupg | gnupg | 2.0.14 | |
| gnupg | gnupg | 2.0.15 | |
| gnupg | gnupg | 2.0.16 | |
| gnupg | gnupg | 2.0.17 | |
| gnupg | gnupg | 2.0.18 | |
| gnupg | gnupg | 2.0.19 | |
| gnupg | libgcrypt | * | |
| gnupg | libgcrypt | 1.4.0 | |
| gnupg | libgcrypt | 1.4.3 | |
| gnupg | libgcrypt | 1.4.4 | |
| gnupg | libgcrypt | 1.4.5 | |
| gnupg | libgcrypt | 1.4.6 | |
| gnupg | libgcrypt | 1.5.0 | |
| gnupg | libgcrypt | 1.5.1 | |
| opensuse | opensuse | 12.2 | |
| opensuse | opensuse | 12.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E452421-0CC6-4881-85CE-5FF790E15DEF",
"versionEndIncluding": "1.4.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5B63BBB3-F0A3-4532-9B9B-F0B0D4D27505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "0C80D00C-A701-4427-9AF8-1EB9B489C809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE5E43F-D03A-4B24-AB9E-D3F58B4CBB70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "18FC4CD4-AF40-4578-A002-CB581248C17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "BACBFCFE-B342-4F0A-86DE-834D9F67C72F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "D961679E-B916-47EE-8E06-5B1900AA80DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AE91418D-A558-4352-8492-4061D1595E5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7649D9A0-5D17-40CB-ACCF-4E6D52E448D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "249C32C0-6C36-4CE4-93EC-70DBF4F81F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEF1CF5-A808-4D81-9249-6931C0FBFA0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C752031B-9B93-4AD7-AA78-C1F6681355A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C06E3DEC-4E24-4A72-A673-7B7021F66AFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02FE144C-7F47-4272-A382-4A3061FBE278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3DA8C4-7498-4931-9DD6-A288F7B79C3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A51DD2D8-0BE3-420B-9C6B-4AC995758235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "46660CA2-1403-47C9-8295-4099609409E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A133DA9B-41D7-434D-A4EF-903FAA4553D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66FC455C-1F58-4C6C-B7DE-B18507A3F29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "545C62E1-89C8-440B-A472-63040465C9F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52469668-39AB-4953-AC80-15F47F5AAD0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD2F511-F515-4733-8B3E-C0721E5D07A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2468BF42-3D18-4D3C-97F6-427257E36BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3A6B2A1B-E862-4429-918C-C412FDB6CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C81CFDA3-6B39-4559-AA67-E006074E610E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "466E18ED-338E-42F2-AD4C-107138DB9454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "5E211E1C-BC8B-463B-816F-E2AAEE02A70F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "46FC73F7-E75C-482E-9C44-F85B2B5A46F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "18FEB19C-810C-48FD-A10A-B4A11767CA79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2E96E1-9E1C-4F7E-9902-F2290B204CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6863306-F7B8-47D9-8FF9-4340FC6D718F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BA95D254-1D85-4523-9DF2-8A07BF05573E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E24FB9C-1CA9-4A1B-8AF6-06B3C1865EF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D07D0653-4538-47D8-AB8F-0A23D65F0AE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95E18355-65AF-4DB4-B6B2-431D7788FF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*",
"matchCriteriaId": "0E61804F-21BA-4850-B859-D69C80F37FFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "88C40692-FE9F-48D6-9AEB-5F35FA369980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*",
"matchCriteriaId": "585F51C8-2FDC-46CE-9F71-ED9EE2ADA472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "18395DAB-24DA-4ABD-ABD8-38A49417B052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6228E3FF-5EB4-4F46-9EA8-1B114947994D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96DEF388-2B09-4212-8AF5-9FE54CCAFEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A798490-741B-4EB4-B1D9-353A181A7AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*",
"matchCriteriaId": "F781A379-57DF-4D1E-8B85-4FD637E4B967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8466E9BD-5623-40EE-A604-0F29C3520B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4E98B61C-7093-4251-B1D8-59B647C2DF6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6F9FCAC0-08D1-4044-A506-4AC14BF381CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "545E4C50-229D-4B27-9DB2-9D1204451A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D50A16A8-9C96-47CB-B18B-AE79C754ABBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08877372-B7DD-4543-84A8-C40D2BA100F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7135BE6C-E797-4C41-BCD5-161DC7561433",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E909F1D4-AFB1-43F3-9635-E318D64099B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4AAE4C-3F59-46D3-A38E-CC5DFCBEC3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "688CDCA9-2809-4C0E-9DBC-133F48D56BEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "564B521B-3C7C-46CF-94E8-A368AF81DA54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC04BFA0-C7B0-4F70-9676-8156C9CE18AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "9F43CE80-06BC-4448-9033-F2F88663C527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "A7181202-BC32-4F1E-9EF8-F544CCDA1671",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*",
"matchCriteriaId": "F55827F8-CC36-45DA-8F9E-1F520911EB12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*",
"matchCriteriaId": "CCEAA5DF-33D1-4D4A-BA01-4BC863DBC272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28374619-966D-4F38-B83E-A6296F27CC05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB20A34-5E11-4D70-B3DE-66DD9863AE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CA47467D-3D96-46DB-B0AC-D28586829710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "68B68F2F-0718-4C87-9629-4657DC49EECC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C14D838-595F-4D1C-88B9-073937316923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CBF8F2C7-574C-4768-ABAA-E3D9236299CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "113D566B-B596-4612-9D11-E238602A603E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFC52C5-1148-4AC6-AAA2-8343E0C2029E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E07E370B-4D2E-4EEC-A3EB-47AA9283278D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E3C52E7-454B-4FE9-9068-87ACB2925A5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "90B62D8E-3A37-4D7A-B674-06FFD80B86FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "59D27E52-B850-4BC0-B81A-A031BC50514B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A0035132-40B2-4C7E-B6E3-F70117F3FC3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3B2D7B2D-CEBC-42BA-90E0-5C71BA39F5BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0626EEB2-39B3-4154-9F99-027057B33D1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "752E350F-E1EB-47CE-95E7-F990F4453BF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F223B411-B9A6-49D4-A9BA-4FBF74B85A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9C4712-169A-4010-B143-98690803E5BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E76177-9B90-40F2-AB9D-7C7249DEC497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A384E132-188E-40AC-84C9-D46A589EE766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "27BE1F8C-EE11-4E9B-9745-037F3AC7CC63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7877BAA-8058-465F-AF8A-C1F4BFC84E04",
"versionEndIncluding": "1.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "128317AB-E441-47E3-BE5C-86C0D9C267E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7509E7-9DF3-42AC-A538-A1BE675253BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FAFA68DC-FFA3-4538-8082-93588CCB44D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEEF3D2-57D5-4E33-8856-B7A859ADD453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "73E283C1-F1AE-4D29-A683-B5C5503133EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AEF669-B7AA-425A-988A-9F858937EC76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload."
},
{
"lang": "es",
"value": "GnuPG anterior a 1.4.14, y Libgcrypt anterior a 1.5.3 usado en GnuPG 2.0.x y posiblemente otros productos, permite a usuarios locales obtener las claves RSA privadas a trav\u00e9s de un ataque \"side-channel\" que involucra la cach\u00e9 L3. Aka Flush+Reload."
}
],
"id": "CVE-2013-4242",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-08-19T23:55:09.010",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"source": "secalert@redhat.com",
"url": "http://eprint.iacr.org/2013/448"
},
{
"source": "secalert@redhat.com",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54318"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54321"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54332"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54375"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"source": "secalert@redhat.com",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/61464"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1923-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://eprint.iacr.org/2013/448"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54318"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54332"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54375"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2730"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2731"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/976534"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/61464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-1923-1"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.