Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-3466 (GCVE-0-2014-3466)
Vulnerability from cvelistv5
Published
2014-06-03 14:00
Modified
2024-08-06 10:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.gnutls.org/security.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "name": "DSA-2944", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2944" }, { "name": "58340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58340" }, { "name": "RHSA-2014:0595", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "name": "USN-2229-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "name": "58642", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58642" }, { "name": "67741", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67741" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59057" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "name": "59086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59086" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "RHSA-2014:0684", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "name": "openSUSE-SU-2014:0763", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59021" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58598", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58598" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "name": "59838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59838" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "60384", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60384" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "59016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59016" }, { "name": "openSUSE-SU-2014:0767", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "name": "58601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58601" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59408" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "name": "1030314", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030314" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.gnutls.org/security.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "name": "DSA-2944", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2944" }, { "name": "58340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58340" }, { "name": "RHSA-2014:0595", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "name": "USN-2229-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "name": "58642", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58642" }, { "name": "67741", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67741" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59057" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "name": "59086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59086" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "name": "SUSE-SU-2014:0758", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "RHSA-2014:0684", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "name": "openSUSE-SU-2014:0763", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "name": "59021", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59021" }, { "name": "RHSA-2014:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58598", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58598" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "name": "59838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59838" }, { "name": "SUSE-SU-2014:0788", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "60384", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60384" }, { "name": "RHSA-2014:0594", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "59016", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59016" }, { "name": "openSUSE-SU-2014:0767", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "name": "58601", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58601" }, { "name": "59408", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59408" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "name": "1030314", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030314" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.gnutls.org/security.html", "refsource": "CONFIRM", "url": "http://www.gnutls.org/security.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "name": "DSA-2944", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2944" }, { "name": "58340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58340" }, { "name": "RHSA-2014:0595", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "name": "USN-2229-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "name": "58642", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58642" }, { "name": "67741", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67741" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59057" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0595.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "name": "59086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59086" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "RHSA-2014:0684", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "name": "openSUSE-SU-2014:0763", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "name": "59021", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59021" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/", "refsource": "MISC", "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58598", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58598" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "name": "59838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59838" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "60384", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60384" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "59016", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59016" }, { "name": "openSUSE-SU-2014:0767", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "name": "58601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58601" }, { "name": "59408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59408" }, { "name": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd", "refsource": "CONFIRM", "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "name": "1030314", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030314" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3466", "datePublished": "2014-06-03T14:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-3466\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-06-03T14:55:10.257\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer en la funci\u00f3n read_server_hello en lib/gnutls_handshake.c en GnuTLS anterior a 3.1.25, 3.2.x anterior a 3.2.15 y 3.3.x anterior a 3.3.4 permite a servidores remotos causar una denegaci\u00f3n de servicio (consumo de memoria) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una sesi\u00f3n id larga en un mensaje ServerHello.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE31FE31-3F85-41F3-9DCB-58A090E63DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A0842D-2CAC-4372-80D0-68BCCC28C7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A91948CE-E418-4450-AB62-9078D3A0FBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34267DC-A768-4A0F-BB54-74314B70E4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160B3AD7-37A3-4A01-B1CD-83E6500E145A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.24\",\"matchCriteriaId\":\"B744589A-9113-4CA1-AEDC-364251547524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D91451B0-301B-430D-9D77-00F4AE91C10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6917AC57-F49D-4EFC-920C-CCAFDF6174B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7ACCE21-A19D-4BE5-9BED-30C5A7418719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344CCDAD-64EC-419C-995B-51F922AB9E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DB8FC4-F84A-47FD-9586-CF02761152A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1B43AF4-E52B-46EA-81CF-D4DCAE82E7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D57BDDEB-090D-472C-9FB6-4555429860E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB23D13-94D2-4FAE-AB76-8574E35E02AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45B0F5E-B4E1-471E-8CDD-85E09837839F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F430F4C6-A738-4E02-BE76-041F71335E62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F272E2DC-7E54-4034-B7BA-30966D57CDFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64EE97BB-D0EE-444A-96FA-D127892216F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB28F388-DE19-4C25-A838-949CA926C31A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DCAA09-7E8C-4C3E-901F-641681AA9E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"435C588C-A478-4FB8-A47D-2605CB39C331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDDABF3-ECA6-433E-A7D6-8E13F0C6433B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0142E0D7-85DD-413B-B176-2FB5E12C2FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780D6C0C-2B20-425E-B15E-EE1AF9F28B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2D3896-E095-4889-A9D1-6D8EB2882D64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3CCDF3A-BEAB-4DA2-A15A-A855FFFD415A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425F7D5B-EE8A-46EC-B986-414FB90702C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC83E92-882B-4984-80FC-FAB7F5CD52E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFAAACF-FD4A-4B1C-A35A-E11189DE2F85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A62B585C-2FC8-448F-97E7-CAC59548B03A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"827A375E-8045-4A81-AB7C-11A89E862518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC1076D-2249-406B-9D43-B24764BBE007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F039CD91-0FF6-4640-B981-20A3F9384A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8008DADD-DB6C-4C67-B333-0DC4C7152B2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9E811B-4EED-4B6A-8836-5405F7F5A53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567E66B1-53D9-4A80-A938-2FE5C7CEB985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2186BE-288F-40FD-B634-76D14578E252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"773043EA-8C41-4F42-9702-660FD6822FD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E05061-D666-492E-AF2B-CF30FC2FA759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22BC2E4-A2A5-4637-A9B9-9E68FC982BC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68DF059C-4C1D-4B9C-993E-1C4D3510471C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E9A21B6-4A22-4801-8023-45F39EC02576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA5F76C-3524-4E80-985F-FC74DD20B5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB890F0-3126-4FDD-8162-AC28754D3D05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35CAA298-D755-4668-A568-439532DF7A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B53422-C666-4140-BF8A-EEDB8AC95A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B1861D-61C3-469E-B37F-B76758626BCB\"}]}]}],\"references\":[{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-0594.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-0595.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"URL Repurposed\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0594.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0595.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0684.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0815.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/58340\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/58598\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/58601\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/58642\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59016\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59021\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59057\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59086\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59408\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59838\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/60384\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678776\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2944\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.gnutls.org/security.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015302\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015303\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/67741\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1030314\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2229-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1101932\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-0594.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-0595.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"URL Repurposed\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0594.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0595.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0684.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0815.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58598\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58601\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59016\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59021\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59086\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59408\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21678776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2944\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gnutls.org/security.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/67741\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1030314\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2229-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1101932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]}]}}" } }
rhsa-2014:0815
Vulnerability from csaf_redhat
Published
2014-06-30 17:28
Modified
2024-11-22 08:01
Summary
Red Hat Security Advisory: rhev-hypervisor6 security update
Notes
Topic
An updated rhev-hypervisor6 package that fixes several security issues is
now available.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: a subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way GnuTLS parsed session IDs from ServerHello
messages of the TLS/SSL handshake. A malicious server could use this flaw
to send an excessively long session ID value, which would trigger a buffer
overflow in a connecting TLS/SSL client application using GnuTLS, causing
the client application to crash or, possibly, execute arbitrary code.
(CVE-2014-3466)
It was discovered that the asn1_get_bit_der() function of the libtasn1
library incorrectly reported the length of ASN.1-encoded data. Specially
crafted ASN.1 input could cause an application using libtasn1 to perform
an out-of-bounds access operation, causing the application to crash or,
possibly, execute arbitrary code. (CVE-2014-3468)
Multiple incorrect buffer boundary check issues were discovered in
libtasn1. Specially crafted ASN.1 input could cause an application using
libtasn1 to crash. (CVE-2014-3467)
Multiple NULL pointer dereference flaws were found in libtasn1's
asn1_read_value() function. Specially crafted ASN.1 input could cause an
application using libtasn1 to crash, if the application used the
aforementioned function in a certain way. (CVE-2014-3469)
Red Hat would like to thank GnuTLS upstream for reporting CVE-2014-3466,
CVE-2014-3468, CVE-2014-3467, and CVE-2014-3469. Upstream acknowledges
Joonas Kuorilehto of Codenomicon as the original reporter of CVE-2014-3466.
This updated package provides an updated kernel component that includes
fixes for various security issues. These issues have no security impact on
Red Hat Enterprise Virtualization Hypervisor itself, however. The security
fixes included in this update address the following CVE numbers:
CVE-2013-6378, CVE-2014-0203, CVE-2014-1737, CVE-2014-1738, CVE-2014-1874,
CVE-2014-2039 and CVE-2014-3153 (kernel issues)
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way GnuTLS parsed session IDs from ServerHello\nmessages of the TLS/SSL handshake. A malicious server could use this flaw\nto send an excessively long session ID value, which would trigger a buffer\noverflow in a connecting TLS/SSL client application using GnuTLS, causing\nthe client application to crash or, possibly, execute arbitrary code.\n(CVE-2014-3466)\n\nIt was discovered that the asn1_get_bit_der() function of the libtasn1\nlibrary incorrectly reported the length of ASN.1-encoded data. Specially\ncrafted ASN.1 input could cause an application using libtasn1 to perform\nan out-of-bounds access operation, causing the application to crash or,\npossibly, execute arbitrary code. (CVE-2014-3468)\n\nMultiple incorrect buffer boundary check issues were discovered in\nlibtasn1. Specially crafted ASN.1 input could cause an application using\nlibtasn1 to crash. (CVE-2014-3467)\n\nMultiple NULL pointer dereference flaws were found in libtasn1\u0027s\nasn1_read_value() function. Specially crafted ASN.1 input could cause an\napplication using libtasn1 to crash, if the application used the\naforementioned function in a certain way. (CVE-2014-3469)\n\nRed Hat would like to thank GnuTLS upstream for reporting CVE-2014-3466,\nCVE-2014-3468, CVE-2014-3467, and CVE-2014-3469. Upstream acknowledges\nJoonas Kuorilehto of Codenomicon as the original reporter of CVE-2014-3466.\n\nThis updated package provides an updated kernel component that includes\nfixes for various security issues. These issues have no security impact on\nRed Hat Enterprise Virtualization Hypervisor itself, however. The security\nfixes included in this update address the following CVE numbers:\n\nCVE-2013-6378, CVE-2014-0203, CVE-2014-1737, CVE-2014-1738, CVE-2014-1874,\nCVE-2014-2039 and CVE-2014-3153 (kernel issues)\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0815", "url": "https://access.redhat.com/errata/RHSA-2014:0815" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "1102022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "category": "external", "summary": "1102323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "category": "external", "summary": "1102329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "category": "external", "summary": "1107789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107789" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0815.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security update", "tracking": { "current_release_date": "2024-11-22T08:01:21+00:00", "generator": { "date": "2024-11-22T08:01:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0815", "initial_release_date": "2014-06-30T17:28:40+00:00", "revision_history": [ { "date": "2014-06-30T17:28:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-30T17:28:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:01:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch", "product_id": "rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140624.0.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] }, { "names": [ "Joonas Kuorilehto" ], "organization": "Codenomicon", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3466", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1101932" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "RHBZ#1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3466", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466" } ], "release_date": "2014-05-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-30T17:28:40+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0815" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3467", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102022" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: multiple boundary check issues", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3467" }, { "category": "external", "summary": "RHBZ#1102022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3467", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3467" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-30T17:28:40+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0815" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: multiple boundary check issues" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3468", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102323" } ], "notes": [ { "category": "description", "text": "The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: asn1_get_bit_der() can return negative bit length", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3468" }, { "category": "external", "summary": "RHBZ#1102323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3468", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3468" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-30T17:28:40+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0815" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: asn1_get_bit_der() can return negative bit length" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3469", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102329" } ], "notes": [ { "category": "description", "text": "The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: asn1_read_value_type() NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3469" }, { "category": "external", "summary": "RHBZ#1102329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3469", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3469" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-30T17:28:40+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0815" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20140624.0.el6ev.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: asn1_read_value_type() NULL pointer dereference" } ] }
rhsa-2014:0594
Vulnerability from csaf_redhat
Published
2014-06-03 16:06
Modified
2024-11-22 08:01
Summary
Red Hat Security Advisory: gnutls security update
Notes
Topic
Updated gnutls packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The GnuTLS library provides support for cryptographic algorithms and for
protocols such as Transport Layer Security (TLS). The gnutls packages also
include the libtasn1 library, which provides Abstract Syntax Notation One
(ASN.1) parsing and structures management, and Distinguished Encoding Rules
(DER) encoding and decoding functions.
A flaw was found in the way GnuTLS parsed session IDs from ServerHello
messages of the TLS/SSL handshake. A malicious server could use this flaw
to send an excessively long session ID value, which would trigger a buffer
overflow in a connecting TLS/SSL client application using GnuTLS, causing
the client application to crash or, possibly, execute arbitrary code.
(CVE-2014-3466)
It was discovered that the asn1_get_bit_der() function of the libtasn1
library incorrectly reported the length of ASN.1-encoded data. Specially
crafted ASN.1 input could cause an application using libtasn1 to perform
an out-of-bounds access operation, causing the application to crash or,
possibly, execute arbitrary code. (CVE-2014-3468)
Multiple incorrect buffer boundary check issues were discovered in
libtasn1. Specially crafted ASN.1 input could cause an application using
libtasn1 to crash. (CVE-2014-3467)
Multiple NULL pointer dereference flaws were found in libtasn1's
asn1_read_value() function. Specially crafted ASN.1 input could cause an
application using libtasn1 to crash, if the application used the
aforementioned function in a certain way. (CVE-2014-3469)
Red Hat would like to thank GnuTLS upstream for reporting these issues.
Upstream acknowledges Joonas Kuorilehto of Codenomicon as the original
reporter of CVE-2014-3466.
Users of GnuTLS are advised to upgrade to these updated packages, which
correct these issues. For the update to take effect, all applications
linked to the GnuTLS or libtasn1 library must be restarted.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated gnutls packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The GnuTLS library provides support for cryptographic algorithms and for\nprotocols such as Transport Layer Security (TLS). The gnutls packages also\ninclude the libtasn1 library, which provides Abstract Syntax Notation One\n(ASN.1) parsing and structures management, and Distinguished Encoding Rules\n(DER) encoding and decoding functions.\n\nA flaw was found in the way GnuTLS parsed session IDs from ServerHello\nmessages of the TLS/SSL handshake. A malicious server could use this flaw\nto send an excessively long session ID value, which would trigger a buffer\noverflow in a connecting TLS/SSL client application using GnuTLS, causing\nthe client application to crash or, possibly, execute arbitrary code.\n(CVE-2014-3466)\n\nIt was discovered that the asn1_get_bit_der() function of the libtasn1\nlibrary incorrectly reported the length of ASN.1-encoded data. Specially\ncrafted ASN.1 input could cause an application using libtasn1 to perform\nan out-of-bounds access operation, causing the application to crash or,\npossibly, execute arbitrary code. (CVE-2014-3468)\n\nMultiple incorrect buffer boundary check issues were discovered in\nlibtasn1. Specially crafted ASN.1 input could cause an application using\nlibtasn1 to crash. (CVE-2014-3467)\n\nMultiple NULL pointer dereference flaws were found in libtasn1\u0027s\nasn1_read_value() function. Specially crafted ASN.1 input could cause an\napplication using libtasn1 to crash, if the application used the\naforementioned function in a certain way. (CVE-2014-3469)\n\nRed Hat would like to thank GnuTLS upstream for reporting these issues.\nUpstream acknowledges Joonas Kuorilehto of Codenomicon as the original\nreporter of CVE-2014-3466.\n\nUsers of GnuTLS are advised to upgrade to these updated packages, which\ncorrect these issues. For the update to take effect, all applications\nlinked to the GnuTLS or libtasn1 library must be restarted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0594", "url": "https://access.redhat.com/errata/RHSA-2014:0594" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "1102022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "category": "external", "summary": "1102323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "category": "external", "summary": "1102329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0594.json" } ], "title": "Red Hat Security Advisory: gnutls security update", "tracking": { "current_release_date": "2024-11-22T08:01:16+00:00", "generator": { "date": "2024-11-22T08:01:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0594", "initial_release_date": "2014-06-03T16:06:30+00:00", "revision_history": [ { "date": "2014-06-03T16:06:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-03T16:06:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:01:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.i386", "product": { "name": "gnutls-0:1.4.1-16.el5_10.i386", "product_id": "gnutls-0:1.4.1-16.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnutls-utils-0:1.4.1-16.el5_10.i386", "product": { "name": "gnutls-utils-0:1.4.1-16.el5_10.i386", "product_id": "gnutls-utils-0:1.4.1-16.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@1.4.1-16.el5_10?arch=i386" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.i386", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.i386", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "product": { "name": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "product_id": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@1.4.1-16.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.x86_64", "product": { "name": "gnutls-0:1.4.1-16.el5_10.x86_64", "product_id": "gnutls-0:1.4.1-16.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.src", "product": { "name": "gnutls-0:1.4.1-16.el5_10.src", "product_id": "gnutls-0:1.4.1-16.el5_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "product": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "product_id": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@1.4.1-16.el5_10?arch=ia64" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.ia64", "product": { "name": "gnutls-0:1.4.1-16.el5_10.ia64", "product_id": "gnutls-0:1.4.1-16.el5_10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=s390" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.s390", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=s390" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.s390", "product": { "name": "gnutls-0:1.4.1-16.el5_10.s390", "product_id": "gnutls-0:1.4.1-16.el5_10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "product": { "name": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "product_id": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@1.4.1-16.el5_10?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.s390x", "product": { "name": "gnutls-0:1.4.1-16.el5_10.s390x", "product_id": "gnutls-0:1.4.1-16.el5_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "product": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "product_id": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@1.4.1-16.el5_10?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.ppc", "product": { "name": "gnutls-0:1.4.1-16.el5_10.ppc", "product_id": "gnutls-0:1.4.1-16.el5_10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "product": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "product_id": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@1.4.1-16.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "product": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "product_id": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@1.4.1-16.el5_10?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-0:1.4.1-16.el5_10.ppc64", "product": { "name": "gnutls-0:1.4.1-16.el5_10.ppc64", "product_id": "gnutls-0:1.4.1-16.el5_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@1.4.1-16.el5_10?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.src", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.src", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Client-Workstation-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.src", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.ppc64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-devel-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.i386", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ia64", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.ppc", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.s390x", "relates_to_product_reference": "5Server-5.10.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:1.4.1-16.el5_10.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" }, "product_reference": "gnutls-utils-0:1.4.1-16.el5_10.x86_64", "relates_to_product_reference": "5Server-5.10.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] }, { "names": [ "Joonas Kuorilehto" ], "organization": "Codenomicon", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3466", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1101932" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "RHBZ#1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3466", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466" } ], "release_date": "2014-05-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-03T16:06:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0594" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3467", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102022" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: multiple boundary check issues", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3467" }, { "category": "external", "summary": "RHBZ#1102022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3467", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3467" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-03T16:06:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0594" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: multiple boundary check issues" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3468", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102323" } ], "notes": [ { "category": "description", "text": "The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: asn1_get_bit_der() can return negative bit length", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3468" }, { "category": "external", "summary": "RHBZ#1102323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3468", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3468" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-03T16:06:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0594" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: asn1_get_bit_der() can return negative bit length" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3469", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1102329" } ], "notes": [ { "category": "description", "text": "The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.", "title": "Vulnerability description" }, { "category": "summary", "text": "libtasn1: asn1_read_value_type() NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3469" }, { "category": "external", "summary": "RHBZ#1102329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1102329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3469", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3469" } ], "release_date": "2014-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-03T16:06:30+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0594" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Client-Workstation-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Client-Workstation-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.src", "5Server-5.10.Z:gnutls-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-debuginfo-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.ppc64", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-devel-0:1.4.1-16.el5_10.x86_64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.i386", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ia64", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.ppc", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.s390x", "5Server-5.10.Z:gnutls-utils-0:1.4.1-16.el5_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libtasn1: asn1_read_value_type() NULL pointer dereference" } ] }
rhsa-2014:0595
Vulnerability from csaf_redhat
Published
2014-06-03 16:06
Modified
2024-11-22 08:00
Summary
Red Hat Security Advisory: gnutls security update
Notes
Topic
Updated gnutls packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The GnuTLS library provides support for cryptographic algorithms and for
protocols such as Transport Layer Security (TLS).
A flaw was found in the way GnuTLS parsed session IDs from ServerHello
messages of the TLS/SSL handshake. A malicious server could use this flaw
to send an excessively long session ID value, which would trigger a buffer
overflow in a connecting TLS/SSL client application using GnuTLS, causing
the client application to crash or, possibly, execute arbitrary code.
(CVE-2014-3466)
Red Hat would like to thank GnuTLS upstream for reporting this issue.
Upstream acknowledges Joonas Kuorilehto of Codenomicon as the original
reporter.
Users of GnuTLS are advised to upgrade to these updated packages, which
correct this issue. For the update to take effect, all applications linked
to the GnuTLS library must be restarted.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated gnutls packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The GnuTLS library provides support for cryptographic algorithms and for\nprotocols such as Transport Layer Security (TLS).\n\nA flaw was found in the way GnuTLS parsed session IDs from ServerHello\nmessages of the TLS/SSL handshake. A malicious server could use this flaw\nto send an excessively long session ID value, which would trigger a buffer\noverflow in a connecting TLS/SSL client application using GnuTLS, causing\nthe client application to crash or, possibly, execute arbitrary code.\n(CVE-2014-3466)\n\nRed Hat would like to thank GnuTLS upstream for reporting this issue.\nUpstream acknowledges Joonas Kuorilehto of Codenomicon as the original\nreporter.\n\nUsers of GnuTLS are advised to upgrade to these updated packages, which\ncorrect this issue. For the update to take effect, all applications linked\nto the GnuTLS library must be restarted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0595", "url": "https://access.redhat.com/errata/RHSA-2014:0595" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0595.json" } ], "title": "Red Hat Security Advisory: gnutls security update", "tracking": { "current_release_date": "2024-11-22T08:00:56+00:00", "generator": { "date": "2024-11-22T08:00:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0595", "initial_release_date": "2014-06-03T16:06:21+00:00", "revision_history": [ { "date": "2014-06-03T16:06:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-03T16:06:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:00:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.x86_64", "product": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64", "product_id": "gnutls-0:2.8.5-14.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "product": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "product_id": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.8.5-14.el6_5?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=i686" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.i686", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=i686" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.i686", "product": { "name": "gnutls-0:2.8.5-14.el6_5.i686", "product_id": "gnutls-0:2.8.5-14.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=i686" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.i686", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=i686" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.8.5-14.el6_5.i686", "product": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686", "product_id": "gnutls-utils-0:2.8.5-14.el6_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.8.5-14.el6_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.s390x", "product": { "name": "gnutls-0:2.8.5-14.el6_5.s390x", "product_id": "gnutls-0:2.8.5-14.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "product": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "product_id": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.8.5-14.el6_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=s390" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.s390", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=s390" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.s390", "product": { "name": "gnutls-0:2.8.5-14.el6_5.s390", "product_id": "gnutls-0:2.8.5-14.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=s390" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.s390", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.ppc64", "product": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64", "product_id": "gnutls-0:2.8.5-14.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "product": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "product_id": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.8.5-14.el6_5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "product": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "product_id": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.8.5-14.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "product": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "product_id": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.8.5-14.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.ppc", "product": { "name": "gnutls-0:2.8.5-14.el6_5.ppc", "product_id": "gnutls-0:2.8.5-14.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "product": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "product_id": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.8.5-14.el6_5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:2.8.5-14.el6_5.src", "product": { "name": "gnutls-0:2.8.5-14.el6_5.src", "product_id": "gnutls-0:2.8.5-14.el6_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.8.5-14.el6_5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Client-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Server-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.src", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-devel-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-guile-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.i686", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.ppc64", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.s390x", "relates_to_product_reference": "6Workstation-optional-6.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.8.5-14.el6_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" }, "product_reference": "gnutls-utils-0:2.8.5-14.el6_5.x86_64", "relates_to_product_reference": "6Workstation-optional-6.5.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] }, { "names": [ "Joonas Kuorilehto" ], "organization": "Codenomicon", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3466", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1101932" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "RHBZ#1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3466", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466" } ], "release_date": "2014-05-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-03T16:06:21+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0595" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Client-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Client-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6ComputeNode-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6ComputeNode-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Server-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Server-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.src", "6Workstation-optional-6.5.z:gnutls-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-debuginfo-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-devel-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-guile-0:2.8.5-14.el6_5.x86_64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.i686", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.ppc64", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.s390x", "6Workstation-optional-6.5.z:gnutls-utils-0:2.8.5-14.el6_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)" } ] }
rhsa-2014:0684
Vulnerability from csaf_redhat
Published
2014-06-10 12:23
Modified
2024-11-22 08:01
Summary
Red Hat Security Advisory: gnutls security update
Notes
Topic
Updated gnutls packages that fix two security issues are now available for
Red Hat Enterprise Linux 7.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The GnuTLS library provides support for cryptographic algorithms and for
protocols such as Transport Layer Security (TLS).
A flaw was found in the way GnuTLS parsed session IDs from ServerHello
messages of the TLS/SSL handshake. A malicious server could use this flaw
to send an excessively long session ID value, which would trigger a buffer
overflow in a connecting TLS/SSL client application using GnuTLS, causing
the client application to crash or, possibly, execute arbitrary code.
(CVE-2014-3466)
A NULL pointer dereference flaw was found in the way GnuTLS parsed X.509
certificates. A specially crafted certificate could cause a server or
client application using GnuTLS to crash. (CVE-2014-3465)
Red Hat would like to thank GnuTLS upstream for reporting these issues.
Upstream acknowledges Joonas Kuorilehto of Codenomicon as the original
reporter of CVE-2014-3466.
Users of GnuTLS are advised to upgrade to these updated packages, which
correct these issues. For the update to take effect, all applications
linked to the GnuTLS library must be restarted.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated gnutls packages that fix two security issues are now available for\nRed Hat Enterprise Linux 7.\n\nThe Red Hat Security Response Team has rated this update as having\nImportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The GnuTLS library provides support for cryptographic algorithms and for\nprotocols such as Transport Layer Security (TLS).\n\nA flaw was found in the way GnuTLS parsed session IDs from ServerHello\nmessages of the TLS/SSL handshake. A malicious server could use this flaw\nto send an excessively long session ID value, which would trigger a buffer\noverflow in a connecting TLS/SSL client application using GnuTLS, causing\nthe client application to crash or, possibly, execute arbitrary code.\n(CVE-2014-3466)\n\nA NULL pointer dereference flaw was found in the way GnuTLS parsed X.509\ncertificates. A specially crafted certificate could cause a server or\nclient application using GnuTLS to crash. (CVE-2014-3465)\n\nRed Hat would like to thank GnuTLS upstream for reporting these issues.\nUpstream acknowledges Joonas Kuorilehto of Codenomicon as the original\nreporter of CVE-2014-3466.\n\nUsers of GnuTLS are advised to upgrade to these updated packages, which\ncorrect these issues. For the update to take effect, all applications\nlinked to the GnuTLS library must be restarted.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0684", "url": "https://access.redhat.com/errata/RHSA-2014:0684" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1101734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101734" }, { "category": "external", "summary": "1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0684.json" } ], "title": "Red Hat Security Advisory: gnutls security update", "tracking": { "current_release_date": "2024-11-22T08:01:01+00:00", "generator": { "date": "2024-11-22T08:01:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0684", "initial_release_date": "2014-06-10T12:23:13+00:00", "revision_history": [ { "date": "2014-06-10T12:23:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-06-10T12:23:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:01:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.i686", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=i686" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=i686" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.i686", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=i686" } } }, { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.i686", "product": { "name": "gnutls-0:3.1.18-9.el7_0.i686", "product_id": "gnutls-0:3.1.18-9.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=i686" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.i686", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@3.1.18-9.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.src", "product": { "name": "gnutls-0:3.1.18-9.el7_0.src", "product_id": "gnutls-0:3.1.18-9.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.s390", "product": { "name": "gnutls-0:3.1.18-9.el7_0.s390", "product_id": "gnutls-0:3.1.18-9.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=s390" } } }, { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.s390", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=s390" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=s390" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.s390", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=s390" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.s390", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@3.1.18-9.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.ppc", "product": { "name": "gnutls-0:3.1.18-9.el7_0.ppc", "product_id": "gnutls-0:3.1.18-9.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@3.1.18-9.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@3.1.18-9.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@3.1.18-9.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@3.1.18-9.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-dane@3.1.18-9.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "product": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "product_id": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-c%2B%2B@3.1.18-9.el7_0?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-c++-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-c++-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-dane-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-dane-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-devel-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:3.1.18-9.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" }, "product_reference": "gnutls-utils-0:3.1.18-9.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] } ], "cve": "CVE-2014-3465", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2014-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1101734" } ], "notes": [ { "category": "description", "text": "The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: gnutls_x509_dn_oid_name NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of gnutls as shipped with Red Hat Enterprise Linux 4, 5, and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3465" }, { "category": "external", "summary": "RHBZ#1101734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3465", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3465" } ], "release_date": "2014-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0684" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gnutls: gnutls_x509_dn_oid_name NULL pointer dereference" }, { "acknowledgments": [ { "names": [ "GnuTLS upstream" ] }, { "names": [ "Joonas Kuorilehto" ], "organization": "Codenomicon", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2014-3466", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2014-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1101932" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way GnuTLS parsed session IDs from ServerHello messages of the TLS/SSL handshake. A malicious server could use this flaw to send an excessively long session ID value, which would trigger a buffer overflow in a connecting TLS/SSL client application using GnuTLS, causing the client application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "RHBZ#1101932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3466", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466" } ], "release_date": "2014-05-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-06-10T12:23:13+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0684" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Client-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Client-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7ComputeNode-optional-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7ComputeNode-optional-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Server-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Server-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.src", "7Workstation-7.0.Z:gnutls-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-c++-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-dane-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-debuginfo-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.i686", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-devel-0:3.1.18-9.el7_0.x86_64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.ppc64", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.s390x", "7Workstation-7.0.Z:gnutls-utils-0:3.1.18-9.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gnutls: insufficient session id length check in _gnutls_read_server_hello (GNUTLS-SA-2014-3)" } ] }
gsd-2014-3466
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-3466", "description": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.", "id": "GSD-2014-3466", "references": [ "https://www.suse.com/security/cve/CVE-2014-3466.html", "https://www.debian.org/security/2014/dsa-2944", "https://access.redhat.com/errata/RHSA-2014:0815", "https://access.redhat.com/errata/RHSA-2014:0684", "https://access.redhat.com/errata/RHSA-2014:0595", "https://access.redhat.com/errata/RHSA-2014:0594", "https://ubuntu.com/security/CVE-2014-3466", "https://advisories.mageia.org/CVE-2014-3466.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-3466.html", "https://linux.oracle.com/cve/CVE-2014-3466.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-3466" ], "details": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.", "id": "GSD-2014-3466", "modified": "2023-12-13T01:22:52.919983Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.gnutls.org/security.html", "refsource": "CONFIRM", "url": "http://www.gnutls.org/security.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "name": "DSA-2944", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2944" }, { "name": "58340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58340" }, { "name": "RHSA-2014:0595", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "name": "USN-2229-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "name": "58642", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58642" }, { "name": "67741", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67741" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "59057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59057" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0595.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "name": "59086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59086" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "name": "RHSA-2014:0684", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "name": "openSUSE-SU-2014:0763", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "name": "59021", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59021" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/", "refsource": "MISC", "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "58598", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58598" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155", "refsource": "CONFIRM", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "name": "59838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59838" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "60384", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60384" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "59016", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59016" }, { "name": "openSUSE-SU-2014:0767", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "name": "58601", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58601" }, { "name": "59408", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59408" }, { "name": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd", "refsource": "CONFIRM", "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "name": "1030314", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030314" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.24", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3466" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.gnutls.org/security.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.gnutls.org/security.html" }, { "name": "DSA-2944", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2944" }, { "name": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch" ], "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "name": "RHSA-2014:0594", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "name": "openSUSE-SU-2014:0767", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "name": "58601", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58601" }, { "name": "59016", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59016" }, { "name": "58642", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58642" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0595.html", "refsource": "CONFIRM", "tags": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "name": "58340", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58340" }, { "name": "58598", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/58598" }, { "name": "openSUSE-SU-2014:0763", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "name": "59057", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59057" }, { "name": "59021", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59021" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-0594.html", "refsource": "CONFIRM", "tags": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "name": "59086", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59086" }, { "name": "RHSA-2014:0815", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "name": "59838", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59838" }, { "name": "1030314", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1030314" }, { "name": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/", "refsource": "MISC", "tags": [ "Exploit" ], "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "name": "67741", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/67741" }, { "name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155", "refsource": "CONFIRM", "tags": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015303", "refsource": "CONFIRM", "tags": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "name": "http://www.novell.com/support/kb/doc.php?id=7015302", "refsource": "CONFIRM", "tags": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "name": "60384", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/60384" }, { "name": "59408", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59408" }, { "name": "USN-2229-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "name": "RHSA-2014:0684", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "name": "RHSA-2014:0595", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "name": "SUSE-SU-2014:0788", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "name": "SUSE-SU-2014:0758", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-12-29T02:29Z", "publishedDate": "2014-06-03T14:55Z" } } }
suse-su-2015:0675-1
Vulnerability from csaf_suse
Published
2014-06-03 20:02
Modified
2014-06-03 20:02
Summary
Security update for gnutls
Notes
Title of the patch
Security update for gnutls
Description of the patch
GnuTLS has been patched to ensure proper parsing of session ids during the
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have
been fixed.
Further information is available at
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
<http://www.gnutls.org/security.html#GNUTLS-SA-2014-3>
These security issues have been fixed:
* Possible memory corruption during connect (CVE-2014-3466)
* Multiple boundary check issues could allow DoS (CVE-2014-3467)
* asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
* Possible DoS by NULL pointer dereference (CVE-2014-3469)
Security Issue references:
* CVE-2014-3466
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466>
Patchnames
sdksp3-gnutls,sledsp3-gnutls,slehasp3-gnutls,sleman17sp2-gnutls,slessp3-gnutls
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for gnutls", "title": "Title of the patch" }, { "category": "description", "text": "\nGnuTLS has been patched to ensure proper parsing of session ids during the \nTLS/SSL handshake. Additionally, three issues inherited from libtasn1 have \nbeen fixed.\n\nFurther information is available at \nhttp://www.gnutls.org/security.html#GNUTLS-SA-2014-3\n\u003chttp://www.gnutls.org/security.html#GNUTLS-SA-2014-3\u003e\n\nThese security issues have been fixed:\n\n * Possible memory corruption during connect (CVE-2014-3466)\n * Multiple boundary check issues could allow DoS (CVE-2014-3467)\n * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)\n * Possible DoS by NULL pointer dereference (CVE-2014-3469)\n\nSecurity Issue references:\n\n * CVE-2014-3466\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-gnutls,sledsp3-gnutls,slehasp3-gnutls,sleman17sp2-gnutls,slessp3-gnutls", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_0675-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:0675-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20150675-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:0675-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" }, { "category": "self", "summary": "SUSE Bug 821818", "url": "https://bugzilla.suse.com/821818" }, { "category": "self", "summary": "SUSE Bug 835760", "url": "https://bugzilla.suse.com/835760" }, { "category": "self", "summary": "SUSE Bug 865804", "url": "https://bugzilla.suse.com/865804" }, { "category": "self", "summary": "SUSE Bug 865993", "url": "https://bugzilla.suse.com/865993" }, { "category": "self", "summary": "SUSE Bug 880730", "url": "https://bugzilla.suse.com/880730" }, { "category": "self", "summary": "SUSE Bug 880910", "url": "https://bugzilla.suse.com/880910" }, { "category": "self", "summary": "SUSE Bug 919938", "url": "https://bugzilla.suse.com/919938" }, { "category": "self", "summary": "SUSE Bug 921684", "url": "https://bugzilla.suse.com/921684" }, { "category": "self", "summary": "SUSE CVE CVE-2009-5138 page", "url": "https://www.suse.com/security/cve/CVE-2009-5138/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2116 page", "url": "https://www.suse.com/security/cve/CVE-2013-2116/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0092 page", "url": "https://www.suse.com/security/cve/CVE-2014-0092/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3466 page", "url": "https://www.suse.com/security/cve/CVE-2014-3466/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8155 page", "url": "https://www.suse.com/security/cve/CVE-2014-8155/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0282 page", "url": "https://www.suse.com/security/cve/CVE-2015-0282/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0294 page", "url": "https://www.suse.com/security/cve/CVE-2015-0294/" } ], "title": "Security update for gnutls", "tracking": { "current_release_date": "2014-06-03T20:02:07Z", "generator": { "date": "2014-06-03T20:02:07Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:0675-1", "initial_release_date": "2014-06-03T20:02:07Z", "revision_history": [ { "date": "2014-06-03T20:02:07Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.51.1.i586", "product": { "name": "libgnutls-devel-2.4.1-24.39.51.1.i586", "product_id": "libgnutls-devel-2.4.1-24.39.51.1.i586" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "product_id": "libgnutls-extra-devel-2.4.1-24.39.51.1.i586" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "product": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "product_id": "libgnutls-extra26-2.4.1-24.39.51.1.i586" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.51.1.i586", "product": { "name": "gnutls-2.4.1-24.39.51.1.i586", "product_id": "gnutls-2.4.1-24.39.51.1.i586" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.51.1.i586", "product": { "name": "libgnutls26-2.4.1-24.39.51.1.i586", "product_id": "libgnutls26-2.4.1-24.39.51.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.51.1.ia64", "product": { "name": "libgnutls-devel-2.4.1-24.39.51.1.ia64", "product_id": "libgnutls-devel-2.4.1-24.39.51.1.ia64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.51.1.ia64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "product_id": "libgnutls-extra26-2.4.1-24.39.51.1.ia64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.51.1.ia64", "product": { "name": "gnutls-2.4.1-24.39.51.1.ia64", "product_id": "gnutls-2.4.1-24.39.51.1.ia64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.51.1.ia64", "product": { "name": "libgnutls26-2.4.1-24.39.51.1.ia64", "product_id": "libgnutls26-2.4.1-24.39.51.1.ia64" } }, { "category": "product_version", "name": "libgnutls26-x86-2.4.1-24.39.51.1.ia64", "product": { "name": "libgnutls26-x86-2.4.1-24.39.51.1.ia64", "product_id": "libgnutls26-x86-2.4.1-24.39.51.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.51.1.ppc64", "product": { "name": "libgnutls-devel-2.4.1-24.39.51.1.ppc64", "product_id": "libgnutls-devel-2.4.1-24.39.51.1.ppc64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "product_id": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.51.1.ppc64", "product": { "name": "gnutls-2.4.1-24.39.51.1.ppc64", "product_id": "gnutls-2.4.1-24.39.51.1.ppc64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.51.1.ppc64", "product": { "name": "libgnutls26-2.4.1-24.39.51.1.ppc64", "product_id": "libgnutls26-2.4.1-24.39.51.1.ppc64" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "product_id": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.51.1.s390x", "product": { "name": "libgnutls-devel-2.4.1-24.39.51.1.s390x", "product_id": "libgnutls-devel-2.4.1-24.39.51.1.s390x" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "product_id": "libgnutls-extra-devel-2.4.1-24.39.51.1.s390x" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "product": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "product_id": "libgnutls-extra26-2.4.1-24.39.51.1.s390x" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.51.1.s390x", "product": { "name": "gnutls-2.4.1-24.39.51.1.s390x", "product_id": "gnutls-2.4.1-24.39.51.1.s390x" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.51.1.s390x", "product": { "name": "libgnutls26-2.4.1-24.39.51.1.s390x", "product_id": "libgnutls26-2.4.1-24.39.51.1.s390x" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "product_id": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.51.1.x86_64", "product": { "name": "libgnutls-devel-2.4.1-24.39.51.1.x86_64", "product_id": "libgnutls-devel-2.4.1-24.39.51.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "product_id": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.51.1.x86_64", "product": { "name": "gnutls-2.4.1-24.39.51.1.x86_64", "product_id": "gnutls-2.4.1-24.39.51.1.x86_64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.51.1.x86_64", "product": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64", "product_id": "libgnutls26-2.4.1-24.39.51.1.x86_64" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "product_id": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 11 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-hae:11:sp3" } } }, { "category": "product_name", "name": "SUSE Manager 1.7", "product": { "name": "SUSE Manager 1.7", "product_id": "SUSE Manager 1.7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:1.7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-devel-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-devel-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.x86_64 as component of SUSE Manager 1.7", "product_id": "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Manager 1.7" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Manager 1.7", "product_id": "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Manager 1.7" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64 as component of SUSE Manager 1.7", "product_id": "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Manager 1.7" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64 as component of SUSE Manager 1.7", "product_id": "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Manager 1.7" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x" }, "product_reference": "gnutls-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-x86-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-x86-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x" }, "product_reference": "gnutls-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-x86-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-x86-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x" }, "product_reference": "gnutls-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-x86-2.4.1-24.39.51.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64" }, "product_reference": "libgnutls26-x86-2.4.1-24.39.51.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-5138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-5138" } ], "notes": [ { "category": "general", "text": "GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-5138", "url": "https://www.suse.com/security/cve/CVE-2009-5138" }, { "category": "external", "summary": "SUSE Bug 865993 for CVE-2009-5138", "url": "https://bugzilla.suse.com/865993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "important" } ], "title": "CVE-2009-5138" }, { "cve": "CVE-2013-2116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2116" } ], "notes": [ { "category": "general", "text": "The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2116", "url": "https://www.suse.com/security/cve/CVE-2013-2116" }, { "category": "external", "summary": "SUSE Bug 821818 for CVE-2013-2116", "url": "https://bugzilla.suse.com/821818" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "moderate" } ], "title": "CVE-2013-2116" }, { "cve": "CVE-2014-0092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0092" } ], "notes": [ { "category": "general", "text": "lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0092", "url": "https://www.suse.com/security/cve/CVE-2014-0092" }, { "category": "external", "summary": "SUSE Bug 865804 for CVE-2014-0092", "url": "https://bugzilla.suse.com/865804" }, { "category": "external", "summary": "SUSE Bug 915878 for CVE-2014-0092", "url": "https://bugzilla.suse.com/915878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "important" } ], "title": "CVE-2014-0092" }, { "cve": "CVE-2014-3466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3466" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3466", "url": "https://www.suse.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "SUSE Bug 880730 for CVE-2014-3466", "url": "https://bugzilla.suse.com/880730" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "moderate" } ], "title": "CVE-2014-3466" }, { "cve": "CVE-2014-8155", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8155" } ], "notes": [ { "category": "general", "text": "GnuTLS before 2.9.10 does not verify the activation and expiration dates of CA certificates, which allows man-in-the-middle attackers to spoof servers via a certificate issued by a CA certificate that is (1) not yet valid or (2) no longer valid.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8155", "url": "https://www.suse.com/security/cve/CVE-2014-8155" }, { "category": "external", "summary": "SUSE Bug 920366 for CVE-2014-8155", "url": "https://bugzilla.suse.com/920366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "important" } ], "title": "CVE-2014-8155" }, { "cve": "CVE-2015-0282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0282" } ], "notes": [ { "category": "general", "text": "GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0282", "url": "https://www.suse.com/security/cve/CVE-2015-0282" }, { "category": "external", "summary": "SUSE Bug 919938 for CVE-2015-0282", "url": "https://bugzilla.suse.com/919938" }, { "category": "external", "summary": "SUSE Bug 921684 for CVE-2015-0282", "url": "https://bugzilla.suse.com/921684" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "important" } ], "title": "CVE-2015-0282" }, { "cve": "CVE-2015-0294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0294" } ], "notes": [ { "category": "general", "text": "GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0294", "url": "https://www.suse.com/security/cve/CVE-2015-0294" }, { "category": "external", "summary": "SUSE Bug 919938 for CVE-2015-0294", "url": "https://bugzilla.suse.com/919938" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:libgnutls26-x86-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra-devel-2.4.1-24.39.51.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP3:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:gnutls-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls-extra26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-2.4.1-24.39.51.1.x86_64", "SUSE Manager 1.7:libgnutls26-32bit-2.4.1-24.39.51.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2014-06-03T20:02:07Z", "details": "important" } ], "title": "CVE-2015-0294" } ] }
fkie_cve-2014-3466
Vulnerability from fkie_nvd
Published
2014-06-03 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://linux.oracle.com/errata/ELSA-2014-0594.html | ||
secalert@redhat.com | http://linux.oracle.com/errata/ELSA-2014-0595.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html | ||
secalert@redhat.com | http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/ | Exploit, URL Repurposed | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0594.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0595.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0684.html | ||
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-0815.html | ||
secalert@redhat.com | http://secunia.com/advisories/58340 | ||
secalert@redhat.com | http://secunia.com/advisories/58598 | ||
secalert@redhat.com | http://secunia.com/advisories/58601 | ||
secalert@redhat.com | http://secunia.com/advisories/58642 | ||
secalert@redhat.com | http://secunia.com/advisories/59016 | ||
secalert@redhat.com | http://secunia.com/advisories/59021 | ||
secalert@redhat.com | http://secunia.com/advisories/59057 | ||
secalert@redhat.com | http://secunia.com/advisories/59086 | ||
secalert@redhat.com | http://secunia.com/advisories/59408 | ||
secalert@redhat.com | http://secunia.com/advisories/59838 | ||
secalert@redhat.com | http://secunia.com/advisories/60384 | ||
secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg21678776 | ||
secalert@redhat.com | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155 | ||
secalert@redhat.com | http://www.debian.org/security/2014/dsa-2944 | ||
secalert@redhat.com | http://www.gnutls.org/security.html | Vendor Advisory | |
secalert@redhat.com | http://www.novell.com/support/kb/doc.php?id=7015302 | ||
secalert@redhat.com | http://www.novell.com/support/kb/doc.php?id=7015303 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/67741 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1030314 | ||
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2229-1 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1101932 | ||
secalert@redhat.com | https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-0594.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-0595.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/ | Exploit, URL Repurposed | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0594.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0595.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0684.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-0815.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58340 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58598 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58601 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58642 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59016 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59021 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59057 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59408 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59838 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60384 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21678776 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-2944 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.gnutls.org/security.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/kb/doc.php?id=7015302 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/kb/doc.php?id=7015303 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/67741 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1030314 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2229-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1101932 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd | Exploit, Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | gnutls | 3.3.0 | |
gnu | gnutls | 3.3.0 | |
gnu | gnutls | 3.3.1 | |
gnu | gnutls | 3.3.2 | |
gnu | gnutls | 3.3.3 | |
gnu | gnutls | * | |
gnu | gnutls | 3.1.0 | |
gnu | gnutls | 3.1.1 | |
gnu | gnutls | 3.1.2 | |
gnu | gnutls | 3.1.3 | |
gnu | gnutls | 3.1.4 | |
gnu | gnutls | 3.1.5 | |
gnu | gnutls | 3.1.6 | |
gnu | gnutls | 3.1.7 | |
gnu | gnutls | 3.1.8 | |
gnu | gnutls | 3.1.9 | |
gnu | gnutls | 3.1.10 | |
gnu | gnutls | 3.1.11 | |
gnu | gnutls | 3.1.12 | |
gnu | gnutls | 3.1.13 | |
gnu | gnutls | 3.1.14 | |
gnu | gnutls | 3.1.15 | |
gnu | gnutls | 3.1.16 | |
gnu | gnutls | 3.1.17 | |
gnu | gnutls | 3.1.18 | |
gnu | gnutls | 3.1.19 | |
gnu | gnutls | 3.1.20 | |
gnu | gnutls | 3.1.21 | |
gnu | gnutls | 3.1.22 | |
gnu | gnutls | 3.1.23 | |
gnu | gnutls | 3.2.0 | |
gnu | gnutls | 3.2.1 | |
gnu | gnutls | 3.2.2 | |
gnu | gnutls | 3.2.3 | |
gnu | gnutls | 3.2.4 | |
gnu | gnutls | 3.2.5 | |
gnu | gnutls | 3.2.6 | |
gnu | gnutls | 3.2.7 | |
gnu | gnutls | 3.2.8 | |
gnu | gnutls | 3.2.8.1 | |
gnu | gnutls | 3.2.9 | |
gnu | gnutls | 3.2.10 | |
gnu | gnutls | 3.2.11 | |
gnu | gnutls | 3.2.12 | |
gnu | gnutls | 3.2.12.1 | |
gnu | gnutls | 3.2.13 | |
gnu | gnutls | 3.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "BE31FE31-3F85-41F3-9DCB-58A090E63DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*", "matchCriteriaId": "18A0842D-2CAC-4372-80D0-68BCCC28C7BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A91948CE-E418-4450-AB62-9078D3A0FBEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D34267DC-A768-4A0F-BB54-74314B70E4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "160B3AD7-37A3-4A01-B1CD-83E6500E145A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*", "matchCriteriaId": "B744589A-9113-4CA1-AEDC-364251547524", "versionEndIncluding": "3.1.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D91451B0-301B-430D-9D77-00F4AE91C10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6917AC57-F49D-4EFC-920C-CCAFDF6174B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "E7ACCE21-A19D-4BE5-9BED-30C5A7418719", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "344CCDAD-64EC-419C-995B-51F922AB9E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "49DB8FC4-F84A-47FD-9586-CF02761152A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A1B43AF4-E52B-46EA-81CF-D4DCAE82E7DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D57BDDEB-090D-472C-9FB6-4555429860E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CB23D13-94D2-4FAE-AB76-8574E35E02AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D45B0F5E-B4E1-471E-8CDD-85E09837839F", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "F430F4C6-A738-4E02-BE76-041F71335E62", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "F272E2DC-7E54-4034-B7BA-30966D57CDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "64EE97BB-D0EE-444A-96FA-D127892216F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB28F388-DE19-4C25-A838-949CA926C31A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "33DCAA09-7E8C-4C3E-901F-641681AA9E3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "435C588C-A478-4FB8-A47D-2605CB39C331", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "9EDDABF3-ECA6-433E-A7D6-8E13F0C6433B", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0142E0D7-85DD-413B-B176-2FB5E12C2FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "780D6C0C-2B20-425E-B15E-EE1AF9F28B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "DC2D3896-E095-4889-A9D1-6D8EB2882D64", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "C3CCDF3A-BEAB-4DA2-A15A-A855FFFD415A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "425F7D5B-EE8A-46EC-B986-414FB90702C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "9BC83E92-882B-4984-80FC-FAB7F5CD52E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "8AFAAACF-FD4A-4B1C-A35A-E11189DE2F85", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "A62B585C-2FC8-448F-97E7-CAC59548B03A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "827A375E-8045-4A81-AB7C-11A89E862518", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEC1076D-2249-406B-9D43-B24764BBE007", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F039CD91-0FF6-4640-B981-20A3F9384A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8008DADD-DB6C-4C67-B333-0DC4C7152B2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BC9E811B-4EED-4B6A-8836-5405F7F5A53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "567E66B1-53D9-4A80-A938-2FE5C7CEB985", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA2186BE-288F-40FD-B634-76D14578E252", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "773043EA-8C41-4F42-9702-660FD6822FD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "37E05061-D666-492E-AF2B-CF30FC2FA759", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A22BC2E4-A2A5-4637-A9B9-9E68FC982BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "68DF059C-4C1D-4B9C-993E-1C4D3510471C", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A21B6-4A22-4801-8023-45F39EC02576", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2EA5F76C-3524-4E80-985F-FC74DD20B5E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "FCB890F0-3126-4FDD-8162-AC28754D3D05", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "35CAA298-D755-4668-A568-439532DF7A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "13B53422-C666-4140-BF8A-EEDB8AC95A70", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "E6B1861D-61C3-469E-B37F-B76758626BCB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message." }, { "lang": "es", "value": "Desbordamiento de buffer en la funci\u00f3n read_server_hello en lib/gnutls_handshake.c en GnuTLS anterior a 3.1.25, 3.2.x anterior a 3.2.15 y 3.3.x anterior a 3.3.4 permite a servidores remotos causar una denegaci\u00f3n de servicio (consumo de memoria) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una sesi\u00f3n id larga en un mensaje ServerHello." } ], "id": "CVE-2014-3466", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-03T14:55:10.257", "references": [ { "source": "secalert@redhat.com", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "secalert@redhat.com", "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "URL Repurposed" ], "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58340" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58598" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58601" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/58642" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59016" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59021" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59057" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59086" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59408" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59838" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60384" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "source": "secalert@redhat.com", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2944" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.gnutls.org/security.html" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "secalert@redhat.com", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/67741" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1030314" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "URL Repurposed" ], "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/58642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.gnutls.org/security.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/67741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1030314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2229-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10105-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
gnutls-3.4.15-1.1 on GA media
Notes
Title of the patch
gnutls-3.4.15-1.1 on GA media
Description of the patch
These are all security issues fixed in the gnutls-3.4.15-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10105
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "gnutls-3.4.15-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the gnutls-3.4.15-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10105", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10105-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2008-4989 page", "url": "https://www.suse.com/security/cve/CVE-2008-4989/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4128 page", "url": "https://www.suse.com/security/cve/CVE-2011-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0390 page", "url": "https://www.suse.com/security/cve/CVE-2012-0390/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1569 page", "url": "https://www.suse.com/security/cve/CVE-2012-1569/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-1573 page", "url": "https://www.suse.com/security/cve/CVE-2012-1573/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0092 page", "url": "https://www.suse.com/security/cve/CVE-2014-0092/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-1959 page", "url": "https://www.suse.com/security/cve/CVE-2014-1959/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3466 page", "url": "https://www.suse.com/security/cve/CVE-2014-3466/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8564 page", "url": "https://www.suse.com/security/cve/CVE-2014-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-6251 page", "url": "https://www.suse.com/security/cve/CVE-2015-6251/" } ], "title": "gnutls-3.4.15-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10105-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gnutls-3.4.15-1.1.aarch64", "product": { "name": "gnutls-3.4.15-1.1.aarch64", "product_id": "gnutls-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "gnutls-guile-3.4.15-1.1.aarch64", "product": { "name": "gnutls-guile-3.4.15-1.1.aarch64", "product_id": "gnutls-guile-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-dane-devel-3.4.15-1.1.aarch64", "product_id": "libgnutls-dane-devel-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-dane0-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-dane0-3.4.15-1.1.aarch64", "product_id": "libgnutls-dane0-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-devel-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-devel-3.4.15-1.1.aarch64", "product_id": "libgnutls-devel-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-devel-32bit-3.4.15-1.1.aarch64", "product_id": "libgnutls-devel-32bit-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-openssl-devel-3.4.15-1.1.aarch64", "product_id": "libgnutls-openssl-devel-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.4.15-1.1.aarch64", "product": { "name": "libgnutls-openssl27-3.4.15-1.1.aarch64", "product_id": "libgnutls-openssl27-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls30-3.4.15-1.1.aarch64", "product": { "name": "libgnutls30-3.4.15-1.1.aarch64", "product_id": "libgnutls30-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.4.15-1.1.aarch64", "product": { "name": "libgnutls30-32bit-3.4.15-1.1.aarch64", "product_id": "libgnutls30-32bit-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.4.15-1.1.aarch64", "product": { "name": "libgnutlsxx-devel-3.4.15-1.1.aarch64", "product_id": "libgnutlsxx-devel-3.4.15-1.1.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.4.15-1.1.aarch64", "product": { "name": "libgnutlsxx28-3.4.15-1.1.aarch64", "product_id": "libgnutlsxx28-3.4.15-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.4.15-1.1.ppc64le", "product": { "name": "gnutls-3.4.15-1.1.ppc64le", "product_id": "gnutls-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "gnutls-guile-3.4.15-1.1.ppc64le", "product": { "name": "gnutls-guile-3.4.15-1.1.ppc64le", "product_id": "gnutls-guile-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-dane-devel-3.4.15-1.1.ppc64le", "product_id": "libgnutls-dane-devel-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-dane0-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-dane0-3.4.15-1.1.ppc64le", "product_id": "libgnutls-dane0-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-devel-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-devel-3.4.15-1.1.ppc64le", "product_id": "libgnutls-devel-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "product_id": "libgnutls-devel-32bit-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "product_id": "libgnutls-openssl-devel-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls-openssl27-3.4.15-1.1.ppc64le", "product_id": "libgnutls-openssl27-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls30-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls30-3.4.15-1.1.ppc64le", "product_id": "libgnutls30-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.4.15-1.1.ppc64le", "product": { "name": "libgnutls30-32bit-3.4.15-1.1.ppc64le", "product_id": "libgnutls30-32bit-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.4.15-1.1.ppc64le", "product": { "name": "libgnutlsxx-devel-3.4.15-1.1.ppc64le", "product_id": "libgnutlsxx-devel-3.4.15-1.1.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx28-3.4.15-1.1.ppc64le", "product": { "name": "libgnutlsxx28-3.4.15-1.1.ppc64le", "product_id": "libgnutlsxx28-3.4.15-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.4.15-1.1.s390x", "product": { "name": "gnutls-3.4.15-1.1.s390x", "product_id": "gnutls-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "gnutls-guile-3.4.15-1.1.s390x", "product": { "name": "gnutls-guile-3.4.15-1.1.s390x", "product_id": "gnutls-guile-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.4.15-1.1.s390x", "product": { "name": "libgnutls-dane-devel-3.4.15-1.1.s390x", "product_id": "libgnutls-dane-devel-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-dane0-3.4.15-1.1.s390x", "product": { "name": "libgnutls-dane0-3.4.15-1.1.s390x", "product_id": "libgnutls-dane0-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-devel-3.4.15-1.1.s390x", "product": { "name": "libgnutls-devel-3.4.15-1.1.s390x", "product_id": "libgnutls-devel-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.4.15-1.1.s390x", "product": { "name": "libgnutls-devel-32bit-3.4.15-1.1.s390x", "product_id": "libgnutls-devel-32bit-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.4.15-1.1.s390x", "product": { "name": "libgnutls-openssl-devel-3.4.15-1.1.s390x", "product_id": "libgnutls-openssl-devel-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.4.15-1.1.s390x", "product": { "name": "libgnutls-openssl27-3.4.15-1.1.s390x", "product_id": "libgnutls-openssl27-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls30-3.4.15-1.1.s390x", "product": { "name": "libgnutls30-3.4.15-1.1.s390x", "product_id": "libgnutls30-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.4.15-1.1.s390x", "product": { "name": "libgnutls30-32bit-3.4.15-1.1.s390x", "product_id": "libgnutls30-32bit-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.4.15-1.1.s390x", "product": { "name": "libgnutlsxx-devel-3.4.15-1.1.s390x", "product_id": "libgnutlsxx-devel-3.4.15-1.1.s390x" } }, { "category": "product_version", "name": "libgnutlsxx28-3.4.15-1.1.s390x", "product": { "name": "libgnutlsxx28-3.4.15-1.1.s390x", "product_id": "libgnutlsxx28-3.4.15-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.4.15-1.1.x86_64", "product": { "name": "gnutls-3.4.15-1.1.x86_64", "product_id": "gnutls-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "gnutls-guile-3.4.15-1.1.x86_64", "product": { "name": "gnutls-guile-3.4.15-1.1.x86_64", "product_id": "gnutls-guile-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-dane-devel-3.4.15-1.1.x86_64", "product_id": "libgnutls-dane-devel-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-dane0-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-dane0-3.4.15-1.1.x86_64", "product_id": "libgnutls-dane0-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-devel-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-devel-3.4.15-1.1.x86_64", "product_id": "libgnutls-devel-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-devel-32bit-3.4.15-1.1.x86_64", "product_id": "libgnutls-devel-32bit-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-openssl-devel-3.4.15-1.1.x86_64", "product_id": "libgnutls-openssl-devel-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.4.15-1.1.x86_64", "product": { "name": "libgnutls-openssl27-3.4.15-1.1.x86_64", "product_id": "libgnutls-openssl27-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls30-3.4.15-1.1.x86_64", "product": { "name": "libgnutls30-3.4.15-1.1.x86_64", "product_id": "libgnutls30-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.4.15-1.1.x86_64", "product": { "name": "libgnutls30-32bit-3.4.15-1.1.x86_64", "product_id": "libgnutls30-32bit-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.4.15-1.1.x86_64", "product": { "name": "libgnutlsxx-devel-3.4.15-1.1.x86_64", "product_id": "libgnutlsxx-devel-3.4.15-1.1.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.4.15-1.1.x86_64", "product": { "name": "libgnutlsxx28-3.4.15-1.1.x86_64", "product_id": "libgnutlsxx28-3.4.15-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64" }, "product_reference": "gnutls-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le" }, "product_reference": "gnutls-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x" }, "product_reference": "gnutls-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64" }, "product_reference": "gnutls-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64" }, "product_reference": "gnutls-guile-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le" }, "product_reference": "gnutls-guile-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x" }, "product_reference": "gnutls-guile-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64" }, "product_reference": "gnutls-guile-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-dane-devel-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-dane-devel-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-dane-devel-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-dane-devel-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-dane0-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-dane0-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-dane0-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-dane0-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-devel-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-devel-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-devel-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-devel-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-devel-32bit-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-devel-32bit-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-devel-32bit-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-openssl-devel-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-openssl-devel-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-openssl-devel-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls-openssl27-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls-openssl27-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x" }, "product_reference": "libgnutls-openssl27-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls-openssl27-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls30-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls30-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x" }, "product_reference": "libgnutls30-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls30-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64" }, "product_reference": "libgnutls30-32bit-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutls30-32bit-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x" }, "product_reference": "libgnutls30-32bit-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64" }, "product_reference": "libgnutls30-32bit-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64" }, "product_reference": "libgnutlsxx-devel-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutlsxx-devel-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x" }, "product_reference": "libgnutlsxx-devel-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64" }, "product_reference": "libgnutlsxx-devel-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.4.15-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64" }, "product_reference": "libgnutlsxx28-3.4.15-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.4.15-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le" }, "product_reference": "libgnutlsxx28-3.4.15-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.4.15-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x" }, "product_reference": "libgnutlsxx28-3.4.15-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.4.15-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" }, "product_reference": "libgnutlsxx28-3.4.15-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-4989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-4989" } ], "notes": [ { "category": "general", "text": "The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-4989", "url": "https://www.suse.com/security/cve/CVE-2008-4989" }, { "category": "external", "summary": "SUSE Bug 392947 for CVE-2008-4989", "url": "https://bugzilla.suse.com/392947" }, { "category": "external", "summary": "SUSE Bug 441856 for CVE-2008-4989", "url": "https://bugzilla.suse.com/441856" }, { "category": "external", "summary": "SUSE Bug 467911 for CVE-2008-4989", "url": "https://bugzilla.suse.com/467911" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-4989" }, { "cve": "CVE-2011-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4128" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4128", "url": "https://www.suse.com/security/cve/CVE-2011-4128" }, { "category": "external", "summary": "SUSE Bug 729486 for CVE-2011-4128", "url": "https://bugzilla.suse.com/729486" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4128" }, { "cve": "CVE-2012-0390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0390" } ], "notes": [ { "category": "general", "text": "The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0390", "url": "https://www.suse.com/security/cve/CVE-2012-0390" }, { "category": "external", "summary": "SUSE Bug 739898 for CVE-2012-0390", "url": "https://bugzilla.suse.com/739898" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0390" }, { "cve": "CVE-2012-1569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1569" } ], "notes": [ { "category": "general", "text": "The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1569", "url": "https://www.suse.com/security/cve/CVE-2012-1569" }, { "category": "external", "summary": "SUSE Bug 752193 for CVE-2012-1569", "url": "https://bugzilla.suse.com/752193" }, { "category": "external", "summary": "SUSE Bug 753301 for CVE-2012-1569", "url": "https://bugzilla.suse.com/753301" }, { "category": "external", "summary": "SUSE Bug 924966 for CVE-2012-1569", "url": "https://bugzilla.suse.com/924966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1569" }, { "cve": "CVE-2012-1573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-1573" } ], "notes": [ { "category": "general", "text": "gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-1573", "url": "https://www.suse.com/security/cve/CVE-2012-1573" }, { "category": "external", "summary": "SUSE Bug 752193 for CVE-2012-1573", "url": "https://bugzilla.suse.com/752193" }, { "category": "external", "summary": "SUSE Bug 754223 for CVE-2012-1573", "url": "https://bugzilla.suse.com/754223" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-1573" }, { "cve": "CVE-2014-0092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0092" } ], "notes": [ { "category": "general", "text": "lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0092", "url": "https://www.suse.com/security/cve/CVE-2014-0092" }, { "category": "external", "summary": "SUSE Bug 865804 for CVE-2014-0092", "url": "https://bugzilla.suse.com/865804" }, { "category": "external", "summary": "SUSE Bug 915878 for CVE-2014-0092", "url": "https://bugzilla.suse.com/915878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0092" }, { "cve": "CVE-2014-1959", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-1959" } ], "notes": [ { "category": "general", "text": "lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-1959", "url": "https://www.suse.com/security/cve/CVE-2014-1959" }, { "category": "external", "summary": "SUSE Bug 863989 for CVE-2014-1959", "url": "https://bugzilla.suse.com/863989" }, { "category": "external", "summary": "SUSE Bug 865993 for CVE-2014-1959", "url": "https://bugzilla.suse.com/865993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-1959" }, { "cve": "CVE-2014-3466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3466" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3466", "url": "https://www.suse.com/security/cve/CVE-2014-3466" }, { "category": "external", "summary": "SUSE Bug 880730 for CVE-2014-3466", "url": "https://bugzilla.suse.com/880730" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3466" }, { "cve": "CVE-2014-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8564" } ], "notes": [ { "category": "general", "text": "The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8564", "url": "https://www.suse.com/security/cve/CVE-2014-8564" }, { "category": "external", "summary": "SUSE Bug 904603 for CVE-2014-8564", "url": "https://bugzilla.suse.com/904603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-8564" }, { "cve": "CVE-2015-6251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-6251" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-6251", "url": "https://www.suse.com/security/cve/CVE-2015-6251" }, { "category": "external", "summary": "SUSE Bug 941794 for CVE-2015-6251", "url": "https://bugzilla.suse.com/941794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.s390x", "openSUSE Tumbleweed:gnutls-guile-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls-openssl27-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.4.15-1.1.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.4.15-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-6251" } ] }
ghsa-cc2g-hj2r-x228
Vulnerability from github
Published
2022-05-14 04:01
Modified
2025-04-12 12:34
VLAI Severity ?
Details
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
{ "affected": [], "aliases": [ "CVE-2014-3466" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-06-03T14:55:00Z", "severity": "MODERATE" }, "details": "Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.", "id": "GHSA-cc2g-hj2r-x228", "modified": "2025-04-12T12:34:25Z", "published": "2022-05-14T04:01:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3466" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101932" }, { "type": "WEB", "url": "https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-0594.html" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-0595.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" }, { "type": "WEB", "url": "http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0594.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0595.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0684.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0815.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/58340" }, { "type": "WEB", "url": "http://secunia.com/advisories/58598" }, { "type": "WEB", "url": "http://secunia.com/advisories/58601" }, { "type": "WEB", "url": "http://secunia.com/advisories/58642" }, { "type": "WEB", "url": "http://secunia.com/advisories/59016" }, { "type": "WEB", "url": "http://secunia.com/advisories/59021" }, { "type": "WEB", "url": "http://secunia.com/advisories/59057" }, { "type": "WEB", "url": "http://secunia.com/advisories/59086" }, { "type": "WEB", "url": "http://secunia.com/advisories/59408" }, { "type": "WEB", "url": "http://secunia.com/advisories/59838" }, { "type": "WEB", "url": "http://secunia.com/advisories/60384" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678776" }, { "type": "WEB", "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2944" }, { "type": "WEB", "url": "http://www.gnutls.org/security.html" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015302" }, { "type": "WEB", "url": "http://www.novell.com/support/kb/doc.php?id=7015303" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/67741" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1030314" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2229-1" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…