RHSA-2012_0532
Vulnerability from csaf_redhat - Published: 2012-04-30 17:07 - Updated: 2024-11-05 17:45Summary
Red Hat Security Advisory: nss security update
Notes
Topic
Updated nss packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.6 Extended Update Support
The Red Hat Security Response Team has rated this update as having
important security impact.
Details
Network Security Services (NSS) is a set of libraries designed to support
the cross-platform development of security-enabled client and server
applications.
It was found that a Certificate Authority (CA) issued fraudulent HTTPS
certificates. This update renders any HTTPS certificates signed by that CA
as untrusted. This covers all uses of the certificates, including SSL,
S/MIME, and code signing. (BZ#734316)
Note: This fix only applies to applications using the NSS Builtin Object
Token. It does not render the certificates untrusted for applications that
use the NSS library, but do not use the NSS Builtin Object Token.
All NSS users should upgrade to these updated packages, which correct this
issue. After installing the update, applications using NSS must be
restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_informational_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated nss packages that fix one security issue are now available for Red \nHat Enterprise Linux 5.6 Extended Update Support\n\nThe Red Hat Security Response Team has rated this update as having \nimportant security impact.",
"title": "Topic"
},
{
"category": "general",
"text": "Network Security Services (NSS) is a set of libraries designed to support\nthe cross-platform development of security-enabled client and server\napplications.\n\nIt was found that a Certificate Authority (CA) issued fraudulent HTTPS\ncertificates. This update renders any HTTPS certificates signed by that CA\nas untrusted. This covers all uses of the certificates, including SSL,\nS/MIME, and code signing. (BZ#734316)\n\nNote: This fix only applies to applications using the NSS Builtin Object\nToken. It does not render the certificates untrusted for applications that\nuse the NSS library, but do not use the NSS Builtin Object Token.\n\nAll NSS users should upgrade to these updated packages, which correct this\nissue. After installing the update, applications using NSS must be\nrestarted for the changes to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0532",
"url": "https://access.redhat.com/errata/RHSA-2012:0532"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "734316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=734316"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0532.json"
}
],
"title": "Red Hat Security Advisory: nss security update",
"tracking": {
"current_release_date": "2024-11-05T17:45:18+00:00",
"generator": {
"date": "2024-11-05T17:45:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.1.1"
}
},
"id": "RHSA-2012:0532",
"initial_release_date": "2012-04-30T17:07:00+00:00",
"revision_history": [
{
"date": "2012-04-30T17:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-04-30T17:13:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-05T17:45:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-tools-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-tools-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-0:3.12.8-6.el5_6.i386",
"product_id": "nss-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.i386",
"product_id": "nss-devel-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.i386",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.i386",
"product_id": "nss-tools-0:3.12.8-6.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-0:3.12.8-6.el5_6.s390",
"product_id": "nss-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.s390",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390",
"product_id": "nss-devel-0:3.12.8-6.el5_6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-tools-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product_id": "nss-devel-0:3.12.8-6.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-debuginfo@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-tools@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-pkcs11-devel@3.12.8-6.el5_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product": {
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product_id": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss-devel@3.12.8-6.el5_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "nss-0:3.12.8-6.el5_6.src",
"product": {
"name": "nss-0:3.12.8-6.el5_6.src",
"product_id": "nss-0:3.12.8-6.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nss@3.12.8-6.el5_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.src"
},
"product_reference": "nss-0:3.12.8-6.el5_6.src",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-debuginfo-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-debuginfo-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-devel-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-devel-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-devel-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.ppc64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.s390"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-pkcs11-devel-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.i386"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.ia64"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.ppc"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.s390x"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-tools-0:3.12.8-6.el5_6.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)",
"product_id": "5Server-5.6.EUS:nss-tools-0:3.12.8-6.el5_6.x86_64"
},
"product_reference": "nss-tools-0:3.12.8-6.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.EUS"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…