RHSA-2012:0532
Vulnerability from csaf_redhat
Published
2012-04-30 17:07
Modified
2025-09-25 11:45
Summary
Red Hat Security Advisory: nss security update
Notes
Topic
Updated nss packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.6 Extended Update Support
The Red Hat Security Response Team has rated this update as having
important security impact.
Details
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.
It was found that a Certificate Authority (CA) issued fraudulent HTTPS
certificates. This update renders any HTTPS certificates signed by that CA
as untrusted. This covers all uses of the certificates, including SSL,
S/MIME, and code signing. (BZ#734316)
Note: This fix only applies to applications using the NSS Builtin Object
Token. It does not render the certificates untrusted for applications that
use the NSS library, but do not use the NSS Builtin Object Token.
All NSS users should upgrade to these updated packages, which correct this
issue. After installing the update, applications using NSS must be
restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nss packages that fix one security issue are now available for Red \nHat Enterprise Linux 5.6 Extended Update Support\n\nThe Red Hat Security Response Team has rated this update as having \nimportant security impact.",
"title": "Topic"
},
{
"category": "general",
"text": "Network Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications.\n\nIt was found that a Certificate Authority (CA) issued fraudulent HTTPS\ncertificates. This update renders any HTTPS certificates signed by that CA\nas untrusted. This covers all uses of the certificates, including SSL,\nS/MIME, and code signing. (BZ#734316)\n\nNote: This fix only applies to applications using the NSS Builtin Object\nToken. It does not render the certificates untrusted for applications that\nuse the NSS library, but do not use the NSS Builtin Object Token.\n\nAll NSS users should upgrade to these updated packages, which correct this\nissue. After installing the update, applications using NSS must be\nrestarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0532",
"url": "https://access.redhat.com/errata/RHSA-2012:0532"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "734316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=734316"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0532.json"
}
],
"title": "Red Hat Security Advisory: nss security update",
"tracking": {
"current_release_date": "2025-09-25T11:45:06+00:00",
"generator": {
"date": "2025-09-25T11:45:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.8"
}
},
"id": "RHSA-2012:0532",
"initial_release_date": "2012-04-30T17:07:00+00:00",
"revision_history": [
{
"date": "2012-04-30T17:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-04-30T17:13:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-09-25T11:45:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-0:3.12.8-6.el5_6.i386",
"product_id": "nss-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.i386",
"product_id": "nss-devel-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.i386",
"product_id": "nss-tools-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-0:3.12.8-6.el5_6.s390",
"product_id": "nss-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390",
"product_id": "nss-devel-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.src",
"product": {
"name": "nss-0:3.12.8-6.el5_6.src",
"product_id": "nss-0:3.12.8-6.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.src"
},
"product_reference": "nss-0:3.12.8-6.el5_6.src",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…