Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2013-4242
Vulnerability from cvelistv5
Published
2013-08-19 23:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "DSA-2731", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2731" }, { "name": "54332", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54332" }, { "name": "54321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54321" }, { "name": "54375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54375" }, { "name": "openSUSE-SU-2013:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "name": "61464", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61464" }, { "name": "USN-1923-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://eprint.iacr.org/2013/448" }, { "name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "name": "VU#976534", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/976534" }, { "name": "DSA-2730", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2730" }, { "name": "RHSA-2013:1457", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "54318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54318" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "DSA-2731", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2731" }, { "name": "54332", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54332" }, { "name": "54321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54321" }, { "name": "54375", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54375" }, { "name": "openSUSE-SU-2013:1294", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "name": "61464", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61464" }, { "name": "USN-1923-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://eprint.iacr.org/2013/448" }, { "name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "name": "VU#976534", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/976534" }, { "name": "DSA-2730", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2730" }, { "name": "RHSA-2013:1457", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "54318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54318" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "DSA-2731", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2731" }, { "name": "54332", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54332" }, { "name": "54321", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54321" }, { "name": "54375", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54375" }, { "name": "openSUSE-SU-2013:1294", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "name": "61464", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61464" }, { "name": "USN-1923-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "name": "http://eprint.iacr.org/2013/448", "refsource": "MISC", "url": "http://eprint.iacr.org/2013/448" }, { "name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released", "refsource": "MLIST", "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "name": "VU#976534", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/976534" }, { "name": "DSA-2730", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2730" }, { "name": "RHSA-2013:1457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "54318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54318" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4242", "datePublished": "2013-08-19T23:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\", \"matchCriteriaId\": \"7118F616-25CA-4E34-AA13-4D14BB62419F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\", \"matchCriteriaId\": \"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2076871-2E80-4605-A470-A41C1A8EC7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFAA48D9-BEB4-4E49-AD50-325C262D46D9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"036E8A89-7A16-411F-9D31-676313BB7244\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.4.13\", \"matchCriteriaId\": \"8E452421-0CC6-4881-85CE-5FF790E15DEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B63BBB3-F0A3-4532-9B9B-F0B0D4D27505\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C80D00C-A701-4427-9AF8-1EB9B489C809\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCE5E43F-D03A-4B24-AB9E-D3F58B4CBB70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18FC4CD4-AF40-4578-A002-CB581248C17B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BACBFCFE-B342-4F0A-86DE-834D9F67C72F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D961679E-B916-47EE-8E06-5B1900AA80DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE91418D-A558-4352-8492-4061D1595E5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7649D9A0-5D17-40CB-ACCF-4E6D52E448D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"249C32C0-6C36-4CE4-93EC-70DBF4F81F71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBEF1CF5-A808-4D81-9249-6931C0FBFA0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C752031B-9B93-4AD7-AA78-C1F6681355A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06E3DEC-4E24-4A72-A673-7B7021F66AFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02FE144C-7F47-4272-A382-4A3061FBE278\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE3DA8C4-7498-4931-9DD6-A288F7B79C3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A51DD2D8-0BE3-420B-9C6B-4AC995758235\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46660CA2-1403-47C9-8295-4099609409E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A133DA9B-41D7-434D-A4EF-903FAA4553D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66FC455C-1F58-4C6C-B7DE-B18507A3F29A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"545C62E1-89C8-440B-A472-63040465C9F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52469668-39AB-4953-AC80-15F47F5AAD0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFD2F511-F515-4733-8B3E-C0721E5D07A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2468BF42-3D18-4D3C-97F6-427257E36BF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A6B2A1B-E862-4429-918C-C412FDB6CC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C81CFDA3-6B39-4559-AA67-E006074E610E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"466E18ED-338E-42F2-AD4C-107138DB9454\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E211E1C-BC8B-463B-816F-E2AAEE02A70F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46FC73F7-E75C-482E-9C44-F85B2B5A46F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18FEB19C-810C-48FD-A10A-B4A11767CA79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E2E96E1-9E1C-4F7E-9902-F2290B204CA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6863306-F7B8-47D9-8FF9-4340FC6D718F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA95D254-1D85-4523-9DF2-8A07BF05573E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E24FB9C-1CA9-4A1B-8AF6-06B3C1865EF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D07D0653-4538-47D8-AB8F-0A23D65F0AE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95E18355-65AF-4DB4-B6B2-431D7788FF23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*\", \"matchCriteriaId\": \"0E61804F-21BA-4850-B859-D69C80F37FFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88C40692-FE9F-48D6-9AEB-5F35FA369980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*\", \"matchCriteriaId\": \"585F51C8-2FDC-46CE-9F71-ED9EE2ADA472\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18395DAB-24DA-4ABD-ABD8-38A49417B052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6228E3FF-5EB4-4F46-9EA8-1B114947994D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96DEF388-2B09-4212-8AF5-9FE54CCAFEC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A798490-741B-4EB4-B1D9-353A181A7AA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*\", \"matchCriteriaId\": \"F781A379-57DF-4D1E-8B85-4FD637E4B967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8466E9BD-5623-40EE-A604-0F29C3520B63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E98B61C-7093-4251-B1D8-59B647C2DF6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F9FCAC0-08D1-4044-A506-4AC14BF381CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"545E4C50-229D-4B27-9DB2-9D1204451A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D50A16A8-9C96-47CB-B18B-AE79C754ABBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08877372-B7DD-4543-84A8-C40D2BA100F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7135BE6C-E797-4C41-BCD5-161DC7561433\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E909F1D4-AFB1-43F3-9635-E318D64099B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB4AAE4C-3F59-46D3-A38E-CC5DFCBEC3DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"688CDCA9-2809-4C0E-9DBC-133F48D56BEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"564B521B-3C7C-46CF-94E8-A368AF81DA54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC04BFA0-C7B0-4F70-9676-8156C9CE18AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F43CE80-06BC-4448-9033-F2F88663C527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7181202-BC32-4F1E-9EF8-F544CCDA1671\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F55827F8-CC36-45DA-8F9E-1F520911EB12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCEAA5DF-33D1-4D4A-BA01-4BC863DBC272\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28374619-966D-4F38-B83E-A6296F27CC05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EB20A34-5E11-4D70-B3DE-66DD9863AE0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA47467D-3D96-46DB-B0AC-D28586829710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68B68F2F-0718-4C87-9629-4657DC49EECC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C14D838-595F-4D1C-88B9-073937316923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBF8F2C7-574C-4768-ABAA-E3D9236299CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"113D566B-B596-4612-9D11-E238602A603E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CFC52C5-1148-4AC6-AAA2-8343E0C2029E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E07E370B-4D2E-4EEC-A3EB-47AA9283278D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E3C52E7-454B-4FE9-9068-87ACB2925A5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90B62D8E-3A37-4D7A-B674-06FFD80B86FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59D27E52-B850-4BC0-B81A-A031BC50514B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0035132-40B2-4C7E-B6E3-F70117F3FC3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B2D7B2D-CEBC-42BA-90E0-5C71BA39F5BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0626EEB2-39B3-4154-9F99-027057B33D1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752E350F-E1EB-47CE-95E7-F990F4453BF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F223B411-B9A6-49D4-A9BA-4FBF74B85A0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F9C4712-169A-4010-B143-98690803E5BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4E76177-9B90-40F2-AB9D-7C7249DEC497\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A384E132-188E-40AC-84C9-D46A589EE766\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27BE1F8C-EE11-4E9B-9745-037F3AC7CC63\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.5.2\", \"matchCriteriaId\": \"C7877BAA-8058-465F-AF8A-C1F4BFC84E04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"128317AB-E441-47E3-BE5C-86C0D9C267E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7509E7-9DF3-42AC-A538-A1BE675253BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAFA68DC-FFA3-4538-8082-93588CCB44D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FEEF3D2-57D5-4E33-8856-B7A859ADD453\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73E283C1-F1AE-4D29-A683-B5C5503133EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7AEF669-B7AA-425A-988A-9F858937EC76\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D806A17E-B8F9-466D-807D-3F1E77603DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.\"}, {\"lang\": \"es\", \"value\": \"GnuPG anterior a 1.4.14, y Libgcrypt anterior a 1.5.3 usado en GnuPG 2.0.x y posiblemente otros productos, permite a usuarios locales obtener las claves RSA privadas a trav\\u00e9s de un ataque \\\"side-channel\\\" que involucra la cach\\u00e9 L3. Aka Flush+Reload.\"}]", "id": "CVE-2013-4242", "lastModified": "2024-11-21T01:55:11.987", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 1.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.4, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-08-19T23:55:09.010", "references": "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://eprint.iacr.org/2013/448\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1457.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/54318\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54321\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54332\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54375\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2013/dsa-2730\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2731\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/976534\", \"source\": \"secalert@redhat.com\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/61464\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1923-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://eprint.iacr.org/2013/448\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1457.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/54318\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54321\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54332\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/54375\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2013/dsa-2730\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2731\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/976534\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/61464\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1923-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-4242\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-19T23:55:09.010\",\"lastModified\":\"2024-11-21T01:55:11.987\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.\"},{\"lang\":\"es\",\"value\":\"GnuPG anterior a 1.4.14, y Libgcrypt anterior a 1.5.3 usado en GnuPG 2.0.x y posiblemente otros productos, permite a usuarios locales obtener las claves RSA privadas a trav\u00e9s de un ataque \\\"side-channel\\\" que involucra la cach\u00e9 L3. Aka Flush+Reload.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"7118F616-25CA-4E34-AA13-4D14BB62419F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFAA48D9-BEB4-4E49-AD50-325C262D46D9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.13\",\"matchCriteriaId\":\"8E452421-0CC6-4881-85CE-5FF790E15DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B63BBB3-F0A3-4532-9B9B-F0B0D4D27505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C80D00C-A701-4427-9AF8-1EB9B489C809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCE5E43F-D03A-4B24-AB9E-D3F58B4CBB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FC4CD4-AF40-4578-A002-CB581248C17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BACBFCFE-B342-4F0A-86DE-834D9F67C72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D961679E-B916-47EE-8E06-5B1900AA80DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE91418D-A558-4352-8492-4061D1595E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7649D9A0-5D17-40CB-ACCF-4E6D52E448D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249C32C0-6C36-4CE4-93EC-70DBF4F81F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEF1CF5-A808-4D81-9249-6931C0FBFA0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C752031B-9B93-4AD7-AA78-C1F6681355A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06E3DEC-4E24-4A72-A673-7B7021F66AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FE144C-7F47-4272-A382-4A3061FBE278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3DA8C4-7498-4931-9DD6-A288F7B79C3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A51DD2D8-0BE3-420B-9C6B-4AC995758235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46660CA2-1403-47C9-8295-4099609409E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A133DA9B-41D7-434D-A4EF-903FAA4553D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66FC455C-1F58-4C6C-B7DE-B18507A3F29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545C62E1-89C8-440B-A472-63040465C9F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52469668-39AB-4953-AC80-15F47F5AAD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD2F511-F515-4733-8B3E-C0721E5D07A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2468BF42-3D18-4D3C-97F6-427257E36BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6B2A1B-E862-4429-918C-C412FDB6CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81CFDA3-6B39-4559-AA67-E006074E610E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466E18ED-338E-42F2-AD4C-107138DB9454\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E211E1C-BC8B-463B-816F-E2AAEE02A70F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FC73F7-E75C-482E-9C44-F85B2B5A46F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FEB19C-810C-48FD-A10A-B4A11767CA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2E96E1-9E1C-4F7E-9902-F2290B204CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6863306-F7B8-47D9-8FF9-4340FC6D718F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA95D254-1D85-4523-9DF2-8A07BF05573E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E24FB9C-1CA9-4A1B-8AF6-06B3C1865EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07D0653-4538-47D8-AB8F-0A23D65F0AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E18355-65AF-4DB4-B6B2-431D7788FF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*\",\"matchCriteriaId\":\"0E61804F-21BA-4850-B859-D69C80F37FFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C40692-FE9F-48D6-9AEB-5F35FA369980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*\",\"matchCriteriaId\":\"585F51C8-2FDC-46CE-9F71-ED9EE2ADA472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18395DAB-24DA-4ABD-ABD8-38A49417B052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6228E3FF-5EB4-4F46-9EA8-1B114947994D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96DEF388-2B09-4212-8AF5-9FE54CCAFEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A798490-741B-4EB4-B1D9-353A181A7AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*\",\"matchCriteriaId\":\"F781A379-57DF-4D1E-8B85-4FD637E4B967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8466E9BD-5623-40EE-A604-0F29C3520B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E98B61C-7093-4251-B1D8-59B647C2DF6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F9FCAC0-08D1-4044-A506-4AC14BF381CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545E4C50-229D-4B27-9DB2-9D1204451A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D50A16A8-9C96-47CB-B18B-AE79C754ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08877372-B7DD-4543-84A8-C40D2BA100F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7135BE6C-E797-4C41-BCD5-161DC7561433\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E909F1D4-AFB1-43F3-9635-E318D64099B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4AAE4C-3F59-46D3-A38E-CC5DFCBEC3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"688CDCA9-2809-4C0E-9DBC-133F48D56BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"564B521B-3C7C-46CF-94E8-A368AF81DA54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC04BFA0-C7B0-4F70-9676-8156C9CE18AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F43CE80-06BC-4448-9033-F2F88663C527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7181202-BC32-4F1E-9EF8-F544CCDA1671\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F55827F8-CC36-45DA-8F9E-1F520911EB12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEAA5DF-33D1-4D4A-BA01-4BC863DBC272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28374619-966D-4F38-B83E-A6296F27CC05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB20A34-5E11-4D70-B3DE-66DD9863AE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA47467D-3D96-46DB-B0AC-D28586829710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B68F2F-0718-4C87-9629-4657DC49EECC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C14D838-595F-4D1C-88B9-073937316923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF8F2C7-574C-4768-ABAA-E3D9236299CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113D566B-B596-4612-9D11-E238602A603E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFC52C5-1148-4AC6-AAA2-8343E0C2029E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07E370B-4D2E-4EEC-A3EB-47AA9283278D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3C52E7-454B-4FE9-9068-87ACB2925A5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B62D8E-3A37-4D7A-B674-06FFD80B86FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D27E52-B850-4BC0-B81A-A031BC50514B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0035132-40B2-4C7E-B6E3-F70117F3FC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2D7B2D-CEBC-42BA-90E0-5C71BA39F5BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0626EEB2-39B3-4154-9F99-027057B33D1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752E350F-E1EB-47CE-95E7-F990F4453BF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F223B411-B9A6-49D4-A9BA-4FBF74B85A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9C4712-169A-4010-B143-98690803E5BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E76177-9B90-40F2-AB9D-7C7249DEC497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A384E132-188E-40AC-84C9-D46A589EE766\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BE1F8C-EE11-4E9B-9745-037F3AC7CC63\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.2\",\"matchCriteriaId\":\"C7877BAA-8058-465F-AF8A-C1F4BFC84E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"128317AB-E441-47E3-BE5C-86C0D9C267E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7509E7-9DF3-42AC-A538-A1BE675253BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAFA68DC-FFA3-4538-8082-93588CCB44D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEEF3D2-57D5-4E33-8856-B7A859ADD453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E283C1-F1AE-4D29-A683-B5C5503133EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7AEF669-B7AA-425A-988A-9F858937EC76\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://eprint.iacr.org/2013/448\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1457.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/54318\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54321\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54332\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54375\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2730\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2731\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/976534\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/61464\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1923-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://eprint.iacr.org/2013/448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1457.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/54318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/54375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/976534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/61464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1923-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-rpp2-q7rq-p78j
Vulnerability from github
Published
2022-05-14 02:10
Modified
2022-05-14 02:10
Details
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
{ "affected": [], "aliases": [ "CVE-2013-4242" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-08-19T23:55:00Z", "severity": "LOW" }, "details": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "id": "GHSA-rpp2-q7rq-p78j", "modified": "2022-05-14T02:10:40Z", "published": "2022-05-14T02:10:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "type": "WEB", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "type": "WEB", "url": "http://eprint.iacr.org/2013/448" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "type": "WEB", "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/54318" }, { "type": "WEB", "url": "http://secunia.com/advisories/54321" }, { "type": "WEB", "url": "http://secunia.com/advisories/54332" }, { "type": "WEB", "url": "http://secunia.com/advisories/54375" }, { "type": "WEB", "url": "http://www.debian.org/security/2013/dsa-2730" }, { "type": "WEB", "url": "http://www.debian.org/security/2013/dsa-2731" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/976534" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/61464" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1923-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2013_1457
Vulnerability from csaf_redhat
Published
2013-10-24 15:18
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: libgcrypt security update
Notes
Topic
An updated libgcrypt package that fixes one security issue is now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libgcrypt library provides general-purpose implementations of various
cryptographic algorithms.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
All libgcrypt users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1457", "url": "https://access.redhat.com/errata/RHSA-2013:1457" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json" } ], "title": "Red Hat Security Advisory: libgcrypt security update", "tracking": { "current_release_date": "2024-11-22T07:13:23+00:00", "generator": { "date": "2024-11-22T07:13:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1457", "initial_release_date": "2013-10-24T15:18:00+00:00", "revision_history": [ { "date": "2013-10-24T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:23:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product_id": "libgcrypt-0:1.4.4-7.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product_id": "libgcrypt-0:1.4.5-11.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" } ] }
rhsa-2013_1458
Vulnerability from csaf_redhat
Published
2013-10-24 15:16
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: gnupg security update
Notes
Topic
An updated gnupg package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and
creating digital signatures, compliant with the proposed OpenPGP Internet
standard and the S/MIME standard.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
A denial of service flaw was found in the way GnuPG parsed certain
compressed OpenPGP packets. An attacker could use this flaw to send
specially crafted input data to GnuPG, making GnuPG enter an infinite loop
when parsing data. (CVE-2013-4402)
It was found that importing a corrupted public key into a GnuPG keyring
database corrupted that keyring. An attacker could use this flaw to trick a
local user into importing a specially crafted public key into their keyring
database, causing the keyring to be corrupted and preventing its further
use. (CVE-2012-6085)
It was found that GnuPG did not properly interpret the key flags in a PGP
key packet. GPG could accept a key for uses not indicated by its holder.
(CVE-2013-4351)
Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402
issue. Upstream acknowledges Taylor R Campbell as the original reporter.
All gnupg users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1458", "url": "https://access.redhat.com/errata/RHSA-2013:1458" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json" } ], "title": "Red Hat Security Advisory: gnupg security update", "tracking": { "current_release_date": "2024-11-22T07:13:28+00:00", "generator": { "date": "2024-11-22T07:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1458", "initial_release_date": "2013-10-24T15:16:00+00:00", "revision_history": [ { "date": "2013-10-24T15:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:22:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.src", "product": { "name": "gnupg-0:1.4.5-18.el5_10.src", "product_id": "gnupg-0:1.4.5-18.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2012-12-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "891142" } ], "notes": [ { "category": "description", "text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: read_block() corrupt key input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6085" }, { "category": "external", "summary": "RHBZ#891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085" } ], "release_date": "2012-12-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "GnuPG: read_block() corrupt key input validation" }, { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" }, { "cve": "CVE-2013-4351", "discovery_date": "2013-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1010137" } ], "notes": [ { "category": "description", "text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnupg: treats no-usage-permitted keys as all-usages-permitted", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4351" }, { "category": "external", "summary": "RHBZ#1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351" } ], "release_date": "2013-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "gnupg: treats no-usage-permitted keys as all-usages-permitted" }, { "acknowledgments": [ { "names": [ "Werner Koch" ] }, { "names": [ "Taylor R Campbell" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4402", "discovery_date": "2013-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1015685" } ], "notes": [ { "category": "description", "text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: infinite recursion in the compressed packet parser DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4402" }, { "category": "external", "summary": "RHBZ#1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402" } ], "release_date": "2013-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG: infinite recursion in the compressed packet parser DoS" } ] }
rhsa-2013:1458
Vulnerability from csaf_redhat
Published
2013-10-24 15:16
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: gnupg security update
Notes
Topic
An updated gnupg package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and
creating digital signatures, compliant with the proposed OpenPGP Internet
standard and the S/MIME standard.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
A denial of service flaw was found in the way GnuPG parsed certain
compressed OpenPGP packets. An attacker could use this flaw to send
specially crafted input data to GnuPG, making GnuPG enter an infinite loop
when parsing data. (CVE-2013-4402)
It was found that importing a corrupted public key into a GnuPG keyring
database corrupted that keyring. An attacker could use this flaw to trick a
local user into importing a specially crafted public key into their keyring
database, causing the keyring to be corrupted and preventing its further
use. (CVE-2012-6085)
It was found that GnuPG did not properly interpret the key flags in a PGP
key packet. GPG could accept a key for uses not indicated by its holder.
(CVE-2013-4351)
Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402
issue. Upstream acknowledges Taylor R Campbell as the original reporter.
All gnupg users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1458", "url": "https://access.redhat.com/errata/RHSA-2013:1458" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json" } ], "title": "Red Hat Security Advisory: gnupg security update", "tracking": { "current_release_date": "2024-11-22T07:13:28+00:00", "generator": { "date": "2024-11-22T07:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1458", "initial_release_date": "2013-10-24T15:16:00+00:00", "revision_history": [ { "date": "2013-10-24T15:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:22:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.src", "product": { "name": "gnupg-0:1.4.5-18.el5_10.src", "product_id": "gnupg-0:1.4.5-18.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2012-12-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "891142" } ], "notes": [ { "category": "description", "text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: read_block() corrupt key input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6085" }, { "category": "external", "summary": "RHBZ#891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085" } ], "release_date": "2012-12-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "GnuPG: read_block() corrupt key input validation" }, { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" }, { "cve": "CVE-2013-4351", "discovery_date": "2013-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1010137" } ], "notes": [ { "category": "description", "text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnupg: treats no-usage-permitted keys as all-usages-permitted", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4351" }, { "category": "external", "summary": "RHBZ#1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351" } ], "release_date": "2013-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "gnupg: treats no-usage-permitted keys as all-usages-permitted" }, { "acknowledgments": [ { "names": [ "Werner Koch" ] }, { "names": [ "Taylor R Campbell" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4402", "discovery_date": "2013-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1015685" } ], "notes": [ { "category": "description", "text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: infinite recursion in the compressed packet parser DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4402" }, { "category": "external", "summary": "RHBZ#1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402" } ], "release_date": "2013-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG: infinite recursion in the compressed packet parser DoS" } ] }
RHSA-2013:1458
Vulnerability from csaf_redhat
Published
2013-10-24 15:16
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: gnupg security update
Notes
Topic
An updated gnupg package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and
creating digital signatures, compliant with the proposed OpenPGP Internet
standard and the S/MIME standard.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
A denial of service flaw was found in the way GnuPG parsed certain
compressed OpenPGP packets. An attacker could use this flaw to send
specially crafted input data to GnuPG, making GnuPG enter an infinite loop
when parsing data. (CVE-2013-4402)
It was found that importing a corrupted public key into a GnuPG keyring
database corrupted that keyring. An attacker could use this flaw to trick a
local user into importing a specially crafted public key into their keyring
database, causing the keyring to be corrupted and preventing its further
use. (CVE-2012-6085)
It was found that GnuPG did not properly interpret the key flags in a PGP
key packet. GPG could accept a key for uses not indicated by its holder.
(CVE-2013-4351)
Red Hat would like to thank Werner Koch for reporting the CVE-2013-4402
issue. Upstream acknowledges Taylor R Campbell as the original reporter.
All gnupg users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gnupg package that fixes multiple security issues is now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and\ncreating digital signatures, compliant with the proposed OpenPGP Internet\nstandard and the S/MIME standard.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nA denial of service flaw was found in the way GnuPG parsed certain\ncompressed OpenPGP packets. An attacker could use this flaw to send\nspecially crafted input data to GnuPG, making GnuPG enter an infinite loop\nwhen parsing data. (CVE-2013-4402)\n\nIt was found that importing a corrupted public key into a GnuPG keyring\ndatabase corrupted that keyring. An attacker could use this flaw to trick a\nlocal user into importing a specially crafted public key into their keyring\ndatabase, causing the keyring to be corrupted and preventing its further\nuse. (CVE-2012-6085)\n\nIt was found that GnuPG did not properly interpret the key flags in a PGP\nkey packet. GPG could accept a key for uses not indicated by its holder.\n(CVE-2013-4351)\n\nRed Hat would like to thank Werner Koch for reporting the CVE-2013-4402\nissue. Upstream acknowledges Taylor R Campbell as the original reporter.\n\nAll gnupg users are advised to upgrade to this updated package, which\ncontains backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1458", "url": "https://access.redhat.com/errata/RHSA-2013:1458" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1458.json" } ], "title": "Red Hat Security Advisory: gnupg security update", "tracking": { "current_release_date": "2024-11-22T07:13:28+00:00", "generator": { "date": "2024-11-22T07:13:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1458", "initial_release_date": "2013-10-24T15:16:00+00:00", "revision_history": [ { "date": "2013-10-24T15:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:22:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.src", "product": { "name": "gnupg-0:1.4.5-18.el5_10.src", "product_id": "gnupg-0:1.4.5-18.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg@1.4.5-18.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_id": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnupg-debuginfo@1.4.5-18.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" }, "product_reference": "gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6085", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2012-12-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "891142" } ], "notes": [ { "category": "description", "text": "The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: read_block() corrupt key input validation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6085" }, { "category": "external", "summary": "RHBZ#891142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6085", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6085" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6085" } ], "release_date": "2012-12-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "GnuPG: read_block() corrupt key input validation" }, { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" }, { "cve": "CVE-2013-4351", "discovery_date": "2013-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1010137" } ], "notes": [ { "category": "description", "text": "GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnupg: treats no-usage-permitted keys as all-usages-permitted", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4351" }, { "category": "external", "summary": "RHBZ#1010137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4351" } ], "release_date": "2013-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "gnupg: treats no-usage-permitted keys as all-usages-permitted" }, { "acknowledgments": [ { "names": [ "Werner Koch" ] }, { "names": [ "Taylor R Campbell" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4402", "discovery_date": "2013-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1015685" } ], "notes": [ { "category": "description", "text": "The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG: infinite recursion in the compressed packet parser DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4402" }, { "category": "external", "summary": "RHBZ#1015685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1015685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4402", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4402" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4402" } ], "release_date": "2013-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1458" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Client-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Client-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.src", "5Server-5.10.Z:gnupg-0:1.4.5-18.el5_10.x86_64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.i386", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ia64", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.ppc", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.s390x", "5Server-5.10.Z:gnupg-debuginfo-0:1.4.5-18.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG: infinite recursion in the compressed packet parser DoS" } ] }
RHSA-2013:1457
Vulnerability from csaf_redhat
Published
2013-10-24 15:18
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: libgcrypt security update
Notes
Topic
An updated libgcrypt package that fixes one security issue is now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libgcrypt library provides general-purpose implementations of various
cryptographic algorithms.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
All libgcrypt users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1457", "url": "https://access.redhat.com/errata/RHSA-2013:1457" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json" } ], "title": "Red Hat Security Advisory: libgcrypt security update", "tracking": { "current_release_date": "2024-11-22T07:13:23+00:00", "generator": { "date": "2024-11-22T07:13:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1457", "initial_release_date": "2013-10-24T15:18:00+00:00", "revision_history": [ { "date": "2013-10-24T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:23:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product_id": "libgcrypt-0:1.4.4-7.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product_id": "libgcrypt-0:1.4.5-11.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" } ] }
rhsa-2013:1457
Vulnerability from csaf_redhat
Published
2013-10-24 15:18
Modified
2024-11-22 07:13
Summary
Red Hat Security Advisory: libgcrypt security update
Notes
Topic
An updated libgcrypt package that fixes one security issue is now available
for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The libgcrypt library provides general-purpose implementations of various
cryptographic algorithms.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
All libgcrypt users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated libgcrypt package that fixes one security issue is now available\nfor Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libgcrypt library provides general-purpose implementations of various\ncryptographic algorithms.\n\nIt was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload\ncache side-channel attack on the RSA secret exponent. An attacker able to\nexecute a process on the logical CPU that shared the L3 cache with the\nGnuPG process (such as a different local user or a user of a KVM guest\nrunning on the same host with the kernel same-page merging functionality\nenabled) could possibly use this flaw to obtain portions of the RSA secret\nkey. (CVE-2013-4242)\n\nAll libgcrypt users are advised to upgrade to this updated package, which\ncontains a backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1457", "url": "https://access.redhat.com/errata/RHSA-2013:1457" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1457.json" } ], "title": "Red Hat Security Advisory: libgcrypt security update", "tracking": { "current_release_date": "2024-11-22T07:13:23+00:00", "generator": { "date": "2024-11-22T07:13:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1457", "initial_release_date": "2013-10-24T15:18:00+00:00", "revision_history": [ { "date": "2013-10-24T15:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-24T15:23:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:13:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.src", "product_id": "libgcrypt-0:1.4.4-7.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=src" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.src", "product_id": "libgcrypt-0:1.4.5-11.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=i386" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=x86_64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc64" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=ppc" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=s390x" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.4-7.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_id": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.4-7.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-debuginfo@1.4.5-11.el6_4?arch=i686" } } }, { "category": "product_version", "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_id": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libgcrypt-devel@1.4.5-11.el6_4?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Client-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Server-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.src", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.i686", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "relates_to_product_reference": "6Workstation-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" }, "product_reference": "libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "relates_to_product_reference": "6Workstation-6.4.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4242", "discovery_date": "2013-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "988589" } ], "notes": [ { "category": "description", "text": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "title": "Vulnerability description" }, { "category": "summary", "text": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4242" }, { "category": "external", "summary": "RHBZ#988589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=988589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4242" }, { "category": "external", "summary": "http://eprint.iacr.org/2013/448", "url": "http://eprint.iacr.org/2013/448" } ], "release_date": "2013-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-24T15:18:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1457" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Client-Workstation-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Client-Workstation-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.src", "5Server-5.10.Z:libgcrypt-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-debuginfo-0:1.4.4-7.el5_10.x86_64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.i386", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ia64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.ppc64", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.s390x", "5Server-5.10.Z:libgcrypt-devel-0:1.4.4-7.el5_10.x86_64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Client-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Client-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6ComputeNode-optional-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6ComputeNode-optional-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Server-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Server-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.src", "6Workstation-6.4.z:libgcrypt-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-debuginfo-0:1.4.5-11.el6_4.x86_64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.i686", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.ppc64", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.s390x", "6Workstation-6.4.z:libgcrypt-devel-0:1.4.5-11.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack" } ] }
cve-2013-4242
Vulnerability from fkie_nvd
Published
2013-08-19 23:55
Modified
2024-11-21 01:55
Severity ?
Summary
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E452421-0CC6-4881-85CE-5FF790E15DEF", "versionEndIncluding": "1.4.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "5B63BBB3-F0A3-4532-9B9B-F0B0D4D27505", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "0C80D00C-A701-4427-9AF8-1EB9B489C809", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "BCE5E43F-D03A-4B24-AB9E-D3F58B4CBB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "18FC4CD4-AF40-4578-A002-CB581248C17B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "BACBFCFE-B342-4F0A-86DE-834D9F67C72F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "D961679E-B916-47EE-8E06-5B1900AA80DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE91418D-A558-4352-8492-4061D1595E5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7649D9A0-5D17-40CB-ACCF-4E6D52E448D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "249C32C0-6C36-4CE4-93EC-70DBF4F81F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF1CF5-A808-4D81-9249-6931C0FBFA0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C752031B-9B93-4AD7-AA78-C1F6681355A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "C06E3DEC-4E24-4A72-A673-7B7021F66AFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "02FE144C-7F47-4272-A382-4A3061FBE278", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "BE3DA8C4-7498-4931-9DD6-A288F7B79C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "A51DD2D8-0BE3-420B-9C6B-4AC995758235", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "46660CA2-1403-47C9-8295-4099609409E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "A133DA9B-41D7-434D-A4EF-903FAA4553D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "66FC455C-1F58-4C6C-B7DE-B18507A3F29A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "545C62E1-89C8-440B-A472-63040465C9F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "52469668-39AB-4953-AC80-15F47F5AAD0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2F511-F515-4733-8B3E-C0721E5D07A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "2468BF42-3D18-4D3C-97F6-427257E36BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "3A6B2A1B-E862-4429-918C-C412FDB6CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "C81CFDA3-6B39-4559-AA67-E006074E610E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "466E18ED-338E-42F2-AD4C-107138DB9454", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "5E211E1C-BC8B-463B-816F-E2AAEE02A70F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "46FC73F7-E75C-482E-9C44-F85B2B5A46F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "18FEB19C-810C-48FD-A10A-B4A11767CA79", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "9E2E96E1-9E1C-4F7E-9902-F2290B204CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6863306-F7B8-47D9-8FF9-4340FC6D718F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BA95D254-1D85-4523-9DF2-8A07BF05573E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E24FB9C-1CA9-4A1B-8AF6-06B3C1865EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D07D0653-4538-47D8-AB8F-0A23D65F0AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "95E18355-65AF-4DB4-B6B2-431D7788FF23", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*", "matchCriteriaId": "0E61804F-21BA-4850-B859-D69C80F37FFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "88C40692-FE9F-48D6-9AEB-5F35FA369980", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*", "matchCriteriaId": "585F51C8-2FDC-46CE-9F71-ED9EE2ADA472", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "18395DAB-24DA-4ABD-ABD8-38A49417B052", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "6228E3FF-5EB4-4F46-9EA8-1B114947994D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DEF388-2B09-4212-8AF5-9FE54CCAFEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A798490-741B-4EB4-B1D9-353A181A7AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*", "matchCriteriaId": "F781A379-57DF-4D1E-8B85-4FD637E4B967", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8466E9BD-5623-40EE-A604-0F29C3520B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4E98B61C-7093-4251-B1D8-59B647C2DF6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "6F9FCAC0-08D1-4044-A506-4AC14BF381CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "545E4C50-229D-4B27-9DB2-9D1204451A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "D50A16A8-9C96-47CB-B18B-AE79C754ABBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "08877372-B7DD-4543-84A8-C40D2BA100F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7135BE6C-E797-4C41-BCD5-161DC7561433", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E909F1D4-AFB1-43F3-9635-E318D64099B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DB4AAE4C-3F59-46D3-A38E-CC5DFCBEC3DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "688CDCA9-2809-4C0E-9DBC-133F48D56BEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "564B521B-3C7C-46CF-94E8-A368AF81DA54", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FC04BFA0-C7B0-4F70-9676-8156C9CE18AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*", "matchCriteriaId": "9F43CE80-06BC-4448-9033-F2F88663C527", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*", "matchCriteriaId": "A7181202-BC32-4F1E-9EF8-F544CCDA1671", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*", "matchCriteriaId": "F55827F8-CC36-45DA-8F9E-1F520911EB12", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*", "matchCriteriaId": "CCEAA5DF-33D1-4D4A-BA01-4BC863DBC272", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "28374619-966D-4F38-B83E-A6296F27CC05", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "3EB20A34-5E11-4D70-B3DE-66DD9863AE0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "CA47467D-3D96-46DB-B0AC-D28586829710", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "68B68F2F-0718-4C87-9629-4657DC49EECC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C14D838-595F-4D1C-88B9-073937316923", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBF8F2C7-574C-4768-ABAA-E3D9236299CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "113D566B-B596-4612-9D11-E238602A603E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4CFC52C5-1148-4AC6-AAA2-8343E0C2029E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E07E370B-4D2E-4EEC-A3EB-47AA9283278D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C52E7-454B-4FE9-9068-87ACB2925A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "90B62D8E-3A37-4D7A-B674-06FFD80B86FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "59D27E52-B850-4BC0-B81A-A031BC50514B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A0035132-40B2-4C7E-B6E3-F70117F3FC3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "3B2D7B2D-CEBC-42BA-90E0-5C71BA39F5BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "0626EEB2-39B3-4154-9F99-027057B33D1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "752E350F-E1EB-47CE-95E7-F990F4453BF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "F223B411-B9A6-49D4-A9BA-4FBF74B85A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "0F9C4712-169A-4010-B143-98690803E5BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "F4E76177-9B90-40F2-AB9D-7C7249DEC497", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A384E132-188E-40AC-84C9-D46A589EE766", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "27BE1F8C-EE11-4E9B-9745-037F3AC7CC63", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7877BAA-8058-465F-AF8A-C1F4BFC84E04", "versionEndIncluding": "1.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE9E5CD-F6F8-4208-ACD2-5E2E88660A01", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "128317AB-E441-47E3-BE5C-86C0D9C267E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C7509E7-9DF3-42AC-A538-A1BE675253BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FAFA68DC-FFA3-4538-8082-93588CCB44D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "5FEEF3D2-57D5-4E33-8856-B7A859ADD453", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "73E283C1-F1AE-4D29-A683-B5C5503133EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7AEF669-B7AA-425A-988A-9F858937EC76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload." }, { "lang": "es", "value": "GnuPG anterior a 1.4.14, y Libgcrypt anterior a 1.5.3 usado en GnuPG 2.0.x y posiblemente otros productos, permite a usuarios locales obtener las claves RSA privadas a trav\u00e9s de un ataque \"side-channel\" que involucra la cach\u00e9 L3. Aka Flush+Reload." } ], "id": "CVE-2013-4242", "lastModified": "2024-11-21T01:55:11.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-19T23:55:09.010", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "source": "secalert@redhat.com", "url": "http://eprint.iacr.org/2013/448" }, { "source": "secalert@redhat.com", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "secalert@redhat.com", "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54318" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54321" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54332" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54375" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2730" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2731" }, { "source": "secalert@redhat.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/976534" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/61464" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://eprint.iacr.org/2013/448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54375" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/976534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1923-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2013-4242
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-4242", "description": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "id": "GSD-2013-4242", "references": [ "https://www.suse.com/security/cve/CVE-2013-4242.html", "https://www.debian.org/security/2013/dsa-2731", "https://www.debian.org/security/2013/dsa-2730", "https://access.redhat.com/errata/RHSA-2013:1458", "https://access.redhat.com/errata/RHSA-2013:1457", "https://advisories.mageia.org/CVE-2013-4242.html", "https://alas.aws.amazon.com/cve/html/CVE-2013-4242.html", "https://linux.oracle.com/cve/CVE-2013-4242.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-4242" ], "details": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.", "id": "GSD-2013-4242", "modified": "2023-12-13T01:22:16.747442Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "DSA-2731", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2731" }, { "name": "54332", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54332" }, { "name": "54321", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54321" }, { "name": "54375", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54375" }, { "name": "openSUSE-SU-2013:1294", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "name": "61464", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61464" }, { "name": "USN-1923-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "name": "http://eprint.iacr.org/2013/448", "refsource": "MISC", "url": "http://eprint.iacr.org/2013/448" }, { "name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released", "refsource": "MLIST", "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "name": "VU#976534", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/976534" }, { "name": "DSA-2730", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2730" }, { "name": "RHSA-2013:1457", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "54318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54318" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.92:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.91:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.4:-:win32:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.90:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.5:-:win32:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.2.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.93:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.2.1:windows:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:0.0.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4242" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "http://eprint.iacr.org/2013/448", "refsource": "MISC", "tags": [], "url": "http://eprint.iacr.org/2013/448" }, { "name": "openSUSE-SU-2013:1294", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html" }, { "name": "54318", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54318" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880", "refsource": "MISC", "tags": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880" }, { "name": "[gnupg-announce] 20130725 [Announce] [security fix] GnuPG 1.4.14 released", "refsource": "MLIST", "tags": [], "url": "http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html" }, { "name": "54375", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54375" }, { "name": "54332", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54332" }, { "name": "DSA-2731", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2013/dsa-2731" }, { "name": "USN-1923-1", "refsource": "UBUNTU", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1923-1" }, { "name": "61464", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/61464" }, { "name": "DSA-2730", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2013/dsa-2730" }, { "name": "54321", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54321" }, { "name": "VU#976534", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/976534" }, { "name": "RHSA-2013:1457", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1457.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "tags": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:27Z", "publishedDate": "2013-08-19T23:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.